x14, &(0x7f0000000080), 0x301) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$SIOCAX25OPTRT(r3, 0x89e7, &(0x7f0000000040)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x44}) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\xa0', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) 22:51:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x816}, 0x28) 22:51:00 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400280, 0x0) write$eventfd(r0, &(0x7f0000000040)=0x6c6f, 0x8) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x817}, 0x28) 22:51:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\xff', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:00 executing program 1: socket$kcm(0xa, 0x2, 0x11) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000020000d0800000000000000000a00140000000000000000001500019695000100ff01000000000000000000000000000114000200fe8000"/72], 0x48}}, 0x0) socket$caif_stream(0x25, 0x1, 0x5) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x9001, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x36, &(0x7f0000000080)=r2, 0xffffffffffffff3f) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f00000000c0)=""/182) 22:51:01 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x0, &(0x7f00001c9fff)="03", 0x3bc) 22:51:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) 22:51:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x80000) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(r3, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x818}, 0x28) 22:51:01 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='securCK64]PIN\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000040)='bdev}\x00', 0x6, 0x5) r1 = socket$kcm(0xa, 0x0, 0x11) socket$tipc(0x1e, 0x2, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000100)=0x2, 0x4) rt_sigpending(&(0x7f00000000c0), 0x8) semget(0x0, 0x4, 0x88) setsockopt$sock_attach_bpf(r1, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:01 executing program 3: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000580)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 22:51:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x819}, 0x28) 22:51:01 executing program 1: socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x29, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000000)={0xff, 0x7}) 22:51:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) 22:51:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:01 executing program 3: 22:51:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x81a}, 0x28) 22:51:01 executing program 3: 22:51:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000000c0)={'filter\x00', 0x0, 0x4, 0x5, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040)=""/5}, &(0x7f0000000140)=0x78) 22:51:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:02 executing program 1: socket$kcm(0xa, 0x2, 0x11) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080)=r3, 0xfffffffffffffe68) epoll_create1(0x0) r4 = getpid() sched_setscheduler(r4, 0x5, 0x0) prctl$PR_MCE_KILL_GET(0x22) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000000c0)=""/110) ioprio_set$pid(0x0, r4, 0x81) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x101000) 22:51:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x2, 0x0, 0x4000}, 0x2c) 22:51:02 executing program 3: 22:51:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x81b}, 0x28) 22:51:02 executing program 3: 22:51:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x81c}, 0x28) 22:51:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) inotify_init1(0x800) 22:51:02 executing program 3: 22:51:02 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'sit0\x00', 0x2000}) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x80, &(0x7f0000000000)=""/48, &(0x7f0000000040)=0x30) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) connect$bt_sco(r3, &(0x7f00000000c0)={0x1f, {0x9, 0x1000, 0x4, 0x80000000, 0x7fff, 0xef24}}, 0x8) 22:51:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x6, 0x0, 0x4000}, 0x2c) 22:51:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x81d}, 0x28) 22:51:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:02 executing program 3: 22:51:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x8, 0x0, 0x4000}, 0x2c) 22:51:02 executing program 1: socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000080), 0x25) 22:51:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x81e}, 0x28) 22:51:02 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0x7fffffff) 22:51:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x81f}, 0x28) 22:51:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x322044, 0x0) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, {0x7, 0x1, 0x40, 0x5, 0xfffffffffffffff7, 0x63e6}}, 0x8) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) fallocate(r0, 0x20, 0x0, 0xf6a1) 22:51:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:03 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r1, 0x200, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000041}, 0x24020850) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x10) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="4800000020000d0800000000000000000a00140000000000000000001500010014000100ff01000000000000000000000000000114000200fe8000000000000000000000000000008c22b60ad52832d82c4a98d578a0651670dc4fcec54a46531f596931524a4de155811913c1"], 0x48}}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'veth1\x00', {0x2, 0x4e23, @empty}}) 22:51:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x10, 0x0, 0x4000}, 0x2c) 22:51:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x820}, 0x28) 22:51:03 executing program 3: accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = memfd_create(&(0x7f0000000100)='ppp0\x00', 0x0) time(0x0) write$9p(r0, 0x0, 0x0) 22:51:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000080000bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000000df0a00b7040000000100006a0af2fe00000000850000004b000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x13}, 0x48) 22:51:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x821}, 0x28) 22:51:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0xdf, 0x0, 0x4000}, 0x2c) 22:51:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket(0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x8) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 22:51:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x822}, 0x28) 22:51:03 executing program 1: r0 = socket$kcm(0xa, 0x1d806935ee1ac222, 0x11) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r1 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r1, 0x0) shmctl$SHM_UNLOCK(r1, 0xc) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x600, 0x0, 0x4000}, 0x2c) 22:51:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x823}, 0x28) 22:51:04 executing program 1: socket$kcm(0xa, 0x7, 0x11) 22:51:04 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={r2}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={r2, 0x4}, 0x8) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$kcm(0xa, 0x2, 0x11) fsync(r3) setsockopt$sock_attach_bpf(r5, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r5, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x5, &(0x7f0000000000)=0x8000, 0x4) socket$nl_generic(0x10, 0x3, 0x10) 22:51:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x824}, 0x28) 22:51:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x3f00, 0x0, 0x4000}, 0x2c) 22:51:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:04 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={r2}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={r2, 0x4}, 0x8) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$kcm(0xa, 0x2, 0x11) fsync(r3) setsockopt$sock_attach_bpf(r5, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r5, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x5, &(0x7f0000000000)=0x8000, 0x4) socket$nl_generic(0x10, 0x3, 0x10) 22:51:04 executing program 1: socket$kcm(0xa, 0x2, 0x11) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0xf7e06e09693532ec, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) setsockopt$sock_attach_bpf(r1, 0x29, 0x36, &(0x7f0000000100)=r4, 0xf8) 22:51:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x825}, 0x28) 22:51:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x4000, 0x0, 0x4000}, 0x2c) 22:51:04 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, r0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) seccomp(0x0, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8b8b, 0x100000000, 0x6, 0x8001}, {0x66, 0x3f, 0x3, 0x37c5}, {0x140000000000000, 0x20, 0xaa, 0x1}, {0x0, 0x1f, 0x7, 0x80000000}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x129000) mq_timedreceive(r1, &(0x7f0000000100)=""/38, 0x26, 0xff, &(0x7f0000000140)) 22:51:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x826}, 0x28) 22:51:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x642}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={r3, @in={{0x2, 0x4e21, @multicast1}}, 0x8, 0x31}, 0x90) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2e4100, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000040)={0x28, 0x2b, 0x8, 0x12, 0x0, 0x7, 0x3, 0x64, 0x1}) 22:51:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x322044, 0x0) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, {0x7, 0x1, 0x40, 0x5, 0xfffffffffffffff7, 0x63e6}}, 0x8) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) ptrace$getregset(0x4204, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000000)=""/128, 0x80}) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x827}, 0x28) 22:51:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0xdf00, 0x0, 0x4000}, 0x2c) 22:51:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x100000001, 0x3ce, 0x8, 0x3, 0x3, 0xfffffffffffffff8, 0x0, 0x81, 0x3f, 0x0, 0xd89, 0x5, 0x1000, 0x1, 0x3, 0x2], 0xf000, 0x5202445fb5c1e5d3}) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x7, 0xbf, &(0x7f00000000c0)="a74e82de91779fd3c52458f61753af1859745176d2af064e97fd110dd1b629be7ef04f5ab1cd1a24fbedb823af088945548c74c0c606f8eae51f50459b792151c9e76c688edb01038b887d0b450291e18d444d30621a91118d0d6f3537c9b4d68bc83f524d706bbf9ab0a04e97016fd3d4e95718fb21ff1ff97c91a323d28a8a7f9d5484892ffaec6cc5f9a4ee32a46ceeb8f12a7924148c4d59e81acd68830bae377fc6f8954786151ccb1b7bfffb936dac4cc4289553cf2382db85c6c110", 0xfffffffffffffff9, 0xc0000000000, 0x2, 0x4, 0x1, 0x2, 0x54c, 'syz1\x00'}) timerfd_settime(r3, 0x1, &(0x7f0000000000)={{0x0, 0x989680}}, &(0x7f0000000040)) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r4, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x80000) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(r3, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:05 executing program 1: pipe2$9p(&(0x7f0000000000), 0x918a7aa31cf52090) socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040), 0xfd1d) 22:51:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x828}, 0x28) 22:51:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$SIOCAX25OPTRT(r3, 0x89e7, &(0x7f0000000040)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x44}) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:05 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) 22:51:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x100000, 0x0, 0x4000}, 0x2c) 22:51:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x829}, 0x28) 22:51:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x100000001, 0x3ce, 0x8, 0x3, 0x3, 0xfffffffffffffff8, 0x0, 0x81, 0x3f, 0x0, 0xd89, 0x5, 0x1000, 0x1, 0x3, 0x2], 0xf000, 0x5202445fb5c1e5d3}) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x7, 0xbf, &(0x7f00000000c0)="a74e82de91779fd3c52458f61753af1859745176d2af064e97fd110dd1b629be7ef04f5ab1cd1a24fbedb823af088945548c74c0c606f8eae51f50459b792151c9e76c688edb01038b887d0b450291e18d444d30621a91118d0d6f3537c9b4d68bc83f524d706bbf9ab0a04e97016fd3d4e95718fb21ff1ff97c91a323d28a8a7f9d5484892ffaec6cc5f9a4ee32a46ceeb8f12a7924148c4d59e81acd68830bae377fc6f8954786151ccb1b7bfffb936dac4cc4289553cf2382db85c6c110", 0xfffffffffffffff9, 0xc0000000000, 0x2, 0x4, 0x1, 0x2, 0x54c, 'syz1\x00'}) timerfd_settime(r3, 0x1, &(0x7f0000000000)={{0x0, 0x989680}}, &(0x7f0000000040)) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r4, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x9, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x82a}, 0x28) 22:51:06 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00d2886300"/18], 0x60) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f00000000c0)=0x10, 0xc00) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'ip6gre0\x00', 0x1}, 0x18) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x204000, 0x0, 0x4000}, 0x2c) 22:51:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x82b}, 0x28) 22:51:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x100000001, 0x3ce, 0x8, 0x3, 0x3, 0xfffffffffffffff8, 0x0, 0x81, 0x3f, 0x0, 0xd89, 0x5, 0x1000, 0x1, 0x3, 0x2], 0xf000, 0x5202445fb5c1e5d3}) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x7, 0xbf, &(0x7f00000000c0)="a74e82de91779fd3c52458f61753af1859745176d2af064e97fd110dd1b629be7ef04f5ab1cd1a24fbedb823af088945548c74c0c606f8eae51f50459b792151c9e76c688edb01038b887d0b450291e18d444d30621a91118d0d6f3537c9b4d68bc83f524d706bbf9ab0a04e97016fd3d4e95718fb21ff1ff97c91a323d28a8a7f9d5484892ffaec6cc5f9a4ee32a46ceeb8f12a7924148c4d59e81acd68830bae377fc6f8954786151ccb1b7bfffb936dac4cc4289553cf2382db85c6c110", 0xfffffffffffffff9, 0xc0000000000, 0x2, 0x4, 0x1, 0x2, 0x54c, 'syz1\x00'}) timerfd_settime(r3, 0x1, &(0x7f0000000000)={{0x0, 0x989680}}, &(0x7f0000000040)) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r4, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f00000002c0)={0x9, 0x1, 0x9, 0x0, 0x0, [], [], [], 0x800, 0x4}) ioctl$TIOCGPTPEER(r2, 0x5441, 0x1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) 22:51:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x82c}, 0x28) 22:51:06 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r2, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r3}, 0x33) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r4, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r5}, 0x33) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x480c000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@mpls_newroute={0xd0, 0x18, 0x200, 0x70bd2a, 0x25dfdbfd, {0x1c, 0x80, 0x80, 0x800, 0x7a, 0x1, 0xfe, 0x0, 0x900}, [@RTA_VIA={0x14, 0x12, {0x4, "ca78bab50aa42544bf4bd16d7fed"}}, @RTA_OIF={0x8, 0x4, r3}, @RTA_MULTIPATH={0xc, 0x9, {0x0, 0x5, 0x8, r5}}, @RTA_NEWDST={0x84, 0x13, [{0xe4, 0x0, 0x8}, {0x3, 0x0, 0xcd40}, {0x7ff, 0x0, 0x100}, {0x2, 0x0, 0xa4}, {0xffffffff, 0x0, 0x7}, {0x5}, {0x80000001, 0x0, 0x100000000}, {0x8001, 0x0, 0x200}, {0x1}, {0x45, 0x0, 0x4}, {}, {0x5, 0x0, 0x6}, {0x7f, 0x0, 0x4659}, {0xacea}, {0x5, 0x0, 0x1}, {0x7, 0x0, 0x8}, {0x84f, 0x0, 0x1}, {0x4, 0x0, 0x3f}, {0xffffffffffffff00, 0x0, 0x8ba}, {0x4, 0x0, 0xfffffffffffffc01}, {0x100, 0x0, 0xc9}, {0xdac, 0x0, 0x4}, {0x314, 0x0, 0x5}, {0x9, 0x0, 0x2}, {0xa98, 0x0, 0x800}, {0x7, 0x0, 0x5}, {0x100000001, 0x0, 0x7}, {0x3, 0x0, 0xfff}, {0x401, 0x0, 0x1}, {0x80000001}, {0xffffffffffffffff, 0x0, 0x3}, {0x4, 0x0, 0x2}]}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0xffa1}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000}, 0x20040000) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x100000001, 0x3ce, 0x8, 0x3, 0x3, 0xfffffffffffffff8, 0x0, 0x81, 0x3f, 0x0, 0xd89, 0x5, 0x1000, 0x1, 0x3, 0x2], 0xf000, 0x5202445fb5c1e5d3}) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x7, 0xbf, &(0x7f00000000c0)="a74e82de91779fd3c52458f61753af1859745176d2af064e97fd110dd1b629be7ef04f5ab1cd1a24fbedb823af088945548c74c0c606f8eae51f50459b792151c9e76c688edb01038b887d0b450291e18d444d30621a91118d0d6f3537c9b4d68bc83f524d706bbf9ab0a04e97016fd3d4e95718fb21ff1ff97c91a323d28a8a7f9d5484892ffaec6cc5f9a4ee32a46ceeb8f12a7924148c4d59e81acd68830bae377fc6f8954786151ccb1b7bfffb936dac4cc4289553cf2382db85c6c110", 0xfffffffffffffff9, 0xc0000000000, 0x2, 0x4, 0x1, 0x2, 0x54c, 'syz1\x00'}) timerfd_settime(r3, 0x1, &(0x7f0000000000)={{0x0, 0x989680}}, &(0x7f0000000040)) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r4, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x400000, 0x0, 0x4000}, 0x2c) 22:51:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x82d}, 0x28) 22:51:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$SIOCAX25OPTRT(r3, 0x89e7, &(0x7f0000000040)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x44}) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f00000000c0)="dbd6b598c6488cc44268a8cd51fdfdd4edd59850763c3dbde06c0d31783a9811d14bae174649fa3af3d5faf23afb3382b8cb7afea2bd497d6bd590983669675f15cba1255438ae8337f668a91d4cc93053ee172626f2f14e2e0dd8c9bb9cea2de38c65dbad7e3b9111a3da7a31e320a14b0082a088ba4530e6b0efe28810160c0eef5fad76d2a71b38e7967764d611f4a527b5b8eea5df3df98ed352c2cc123de9ac35fd1ac10e5b39286403513308a9232548660f2acf2b76826be86bb22c5533d7e94d9d5422547d000f5eb685f5dcae390cf7354644ad3ac2547d550f119be6566d06ca84a1efda59568debe4") r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) openat$cgroup_subtree(r2, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000080), 0x301) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000000c0)=@short={0xb, @dev, @netrom, 0x1, @rose}, &(0x7f0000000100)=0x1c, 0x800) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) r10 = openat(r9, &(0x7f0000000140)='./file0\x00', 0x0, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r10, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r11, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffffffffffb}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r12 = getpid() sched_setscheduler(r12, 0x5, 0x0) r13 = syz_open_procfs(r12, &(0x7f00000003c0)='net/packet\x00') sendmsg$inet_sctp(r13, &(0x7f0000000500)={&(0x7f0000000400)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000000480)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x5}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x14}}, @init={0x18, 0x84, 0x0, {0x9, 0xfff, 0x7, 0x2}}], 0x50, 0x4000}, 0x4009864) sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$BLKROTATIONAL(r6, 0x127e, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r3, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x82e}, 0x28) 22:51:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\xff', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x402000, 0x0, 0x4000}, 0x2c) 22:51:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x82f}, 0x28) 22:51:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) openat$cgroup_subtree(r2, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000080), 0x301) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000000c0)=@short={0xb, @dev, @netrom, 0x1, @rose}, &(0x7f0000000100)=0x1c, 0x800) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) r10 = openat(r9, &(0x7f0000000140)='./file0\x00', 0x0, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r10, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r11, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffffffffffb}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r12 = getpid() sched_setscheduler(r12, 0x5, 0x0) r13 = syz_open_procfs(r12, &(0x7f00000003c0)='net/packet\x00') sendmsg$inet_sctp(r13, &(0x7f0000000500)={&(0x7f0000000400)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000000480)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x5}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x14}}, @init={0x18, 0x84, 0x0, {0x9, 0xfff, 0x7, 0x2}}], 0x50, 0x4000}, 0x4009864) sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$BLKROTATIONAL(r6, 0x127e, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r3, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:07 executing program 1: connect$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x1e) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmmsg(r5, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r5, 0x114, 0xa, &(0x7f0000000100)={0x2, "60e7"}, 0x3) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) accept$packet(r2, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 22:51:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x830}, 0x28) 22:51:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\xff', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:07 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f00000000c0), 0x3000, &(0x7f0000000100)='\x00') setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x831}, 0x28) 22:51:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) openat$cgroup_subtree(r2, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000080), 0x301) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000000c0)=@short={0xb, @dev, @netrom, 0x1, @rose}, &(0x7f0000000100)=0x1c, 0x800) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) r10 = openat(r9, &(0x7f0000000140)='./file0\x00', 0x0, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r10, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r11, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffffffffffb}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r12 = getpid() sched_setscheduler(r12, 0x5, 0x0) r13 = syz_open_procfs(r12, &(0x7f00000003c0)='net/packet\x00') sendmsg$inet_sctp(r13, &(0x7f0000000500)={&(0x7f0000000400)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000000480)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x5}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x14}}, @init={0x18, 0x84, 0x0, {0x9, 0xfff, 0x7, 0x2}}], 0x50, 0x4000}, 0x4009864) sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$BLKROTATIONAL(r6, 0x127e, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r3, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x1000000, 0x0, 0x4000}, 0x2c) 22:51:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:07 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x47, 0x84000) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x832}, 0x28) 22:51:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) openat$cgroup_subtree(r2, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000080), 0x301) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000000c0)=@short={0xb, @dev, @netrom, 0x1, @rose}, &(0x7f0000000100)=0x1c, 0x800) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) r10 = openat(r9, &(0x7f0000000140)='./file0\x00', 0x0, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r10, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r11, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffffffffffb}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r12 = getpid() sched_setscheduler(r12, 0x5, 0x0) r13 = syz_open_procfs(r12, &(0x7f00000003c0)='net/packet\x00') sendmsg$inet_sctp(r13, &(0x7f0000000500)={&(0x7f0000000400)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000000480)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x5}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x14}}, @init={0x18, 0x84, 0x0, {0x9, 0xfff, 0x7, 0x2}}], 0x50, 0x4000}, 0x4009864) sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$BLKROTATIONAL(r6, 0x127e, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r3, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x1, {0xdce2, 0x4, "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", 0xdc, 0x200, 0x8989, 0x20, 0x2c63, 0x9, 0x1, 0x1}}}, 0x128) 22:51:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x2000000, 0x0, 0x4000}, 0x2c) 22:51:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000000)) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x833}, 0x28) 22:51:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r2, 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r2, r4) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080), 0x4) 22:51:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x834}, 0x28) 22:51:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\xff', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmmsg(r5, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r5, 0x114, 0xa, &(0x7f0000000100)={0x2, "60e7"}, 0x3) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) accept$packet(r2, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 22:51:08 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r5, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r6}, 0x33) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', r6}) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000040)={r7, 0x1, 0x6, @dev={[], 0x12}}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x6000000, 0x0, 0x4000}, 0x2c) 22:51:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x835}, 0x28) 22:51:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x8000000, 0x0, 0x4000}, 0x2c) 22:51:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmmsg(r5, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r5, 0x114, 0xa, &(0x7f0000000100)={0x2, "60e7"}, 0x3) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) accept$packet(r2, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 22:51:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:09 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xffffff37) 22:51:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x836}, 0x28) 22:51:09 executing program 1: r0 = socket$kcm(0xa, 0x0, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev\xaf\x00', 0x400, 0x0) setsockopt$sock_attach_bpf(r4, 0x29, 0x36, &(0x7f0000000080)=r5, 0x724e) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0xfff) 22:51:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x837}, 0x28) 22:51:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmmsg(r5, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r5, 0x114, 0xa, &(0x7f0000000100)={0x2, "60e7"}, 0x3) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) accept$packet(r2, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 22:51:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20002, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="48003c1d68e7cd642c4c9509636d047e00000a00140000000000000000001500010014000100ff0100000000b1fd8666bbae33fe8000b124311500000000000000000000000000000000000000000043976e7a56f600d3d05eaa7914c053250615069ee22b6ea841044e1622f197a7137f6652016d8ddba72b091671e6eee26f8e312361e2cc415e6eb395b579354f0170b01dc39dc2e9d090273ef2d4"], 0x48}}, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100)=0x1f, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f0000000140)=0x9, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x838}, 0x28) 22:51:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x3f000000, 0x0, 0x4000}, 0x2c) 22:51:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:09 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(aegis128l-aesni)\x00'}, 0x58) r5 = accept4(r1, 0x0, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$SIOCRSGCAUSE(r8, 0x89e0, &(0x7f0000000000)) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001480)=[{&(0x7f00000002c0)=""/147, 0x93}, {&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/107, 0x6b}, {&(0x7f0000001400)=""/74, 0x4a}, {&(0x7f0000000180)=""/4, 0x4}], 0x6, &(0x7f0000001500)=""/190, 0xbe}, 0x20) ioctl$sock_inet6_SIOCSIFDSTADDR(r11, 0x8918, &(0x7f00000015c0)={@local, 0x2d, r12}) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r14 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000001600)='/dev/usbmon0\x00', 0x20080, 0x0) sendfile(r5, r14, 0x0, 0x50000000000443) r15 = getpid() sched_setscheduler(r15, 0x5, 0x0) fcntl$lock(r8, 0x6, &(0x7f0000000040)={0x1, 0x3, 0x6, 0x4, r15}) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080)=r13, 0xc00db9189131617b) 22:51:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x839}, 0x28) 22:51:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x80', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:10 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$ax25(r2, &(0x7f0000000000)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 22:51:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x83a}, 0x28) 22:51:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x40000000, 0x0, 0x4000}, 0x2c) 22:51:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x2) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x90', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x83b}, 0x28) 22:51:10 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/234, 0xea) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@mpls_getroute={0x14c, 0x1a, 0x0, 0x70bd29, 0x25dfdbfc, {0x1c, 0x14, 0x10, 0x10001, 0x102, 0x0, 0xff, 0x1}, [@RTA_VIA={0x14, 0x12, {0x3, "3c79822a471079cf4e5120805182"}}, @RTA_VIA={0x14, 0x12, {0x4, "5aa759a629b33e268250c4768da8"}}, @RTA_NEWDST={0x84, 0x13, [{0x100000001, 0x0, 0xfffffffffffffff7}, {0x8, 0x0, 0xfffffffffffffffb}, {0xfffffffffffffffa, 0x0, 0x3}, {0xa5f5, 0x0, 0x3}, {0x54bbd0bc, 0x0, 0xffe000000000000}, {0x6, 0x0, 0x5}, {0x101, 0x0, 0x2}, {0xfffffffffffffffc, 0x0, 0x7ff}, {0x9, 0x0, 0x3f}, {0x0, 0x0, 0x9}, {0x7, 0x0, 0x6}, {0x1400000000000000, 0x0, 0xdf}, {0x80, 0x0, 0x7}, {0x7, 0x0, 0x7fffffff}, {0x7, 0x0, 0x7}, {0xffff, 0x0, 0x81}, {0xea9c, 0x0, 0x81}, {0x40, 0x0, 0x5}, {0x9e, 0x0, 0x7}, {0x2, 0x0, 0x101}, {0x6, 0x0, 0x40}, {0x100, 0x0, 0x75}, {0x3b0, 0x0, 0x3}, {0x3, 0x0, 0x5}, {0x3ff, 0x0, 0x800}, {0x0, 0x0, 0x3}, {0x1, 0x0, 0x5}, {0x3, 0x0, 0x81}, {0x25}, {0xffffffffffffffc0, 0x0, 0x7}, {0x7, 0x0, 0x5}, {0x57273c69, 0x0, 0x200}]}, @RTA_NEWDST={0x84, 0x13, [{0x2d9, 0x0, 0x5}, {0x9, 0x0, 0x6}, {0x9, 0x0, 0x5}, {0x2, 0x0, 0x7f}, {0xb2, 0x0, 0xfff}, {0x7f, 0x0, 0x1}, {0x6, 0x0, 0x3}, {0x7fffffff, 0x0, 0x7e8}, {0x8, 0x0, 0x200}, {0x40, 0x0, 0x2}, {0xb4, 0x0, 0x94}, {0x100000001, 0x0, 0x100000000}, {0x399c, 0x0, 0x1}, {0x400, 0x0, 0x5}, {0x8001, 0x0, 0x7}, {0x7, 0x0, 0x3}, {0x3, 0x0, 0x7}, {0x100000000}, {0x1, 0x0, 0x6}, {0x200, 0x0, 0x6}, {0x31d2, 0x0, 0x3}, {0x5, 0x0, 0xfffffffffffffffe}, {0x251600000000, 0x0, 0x1f}, {0x7, 0x0, 0x6}, {0x9, 0x0, 0x6}, {0x4}, {0x7eb, 0x0, 0x200}, {0xaab, 0x0, 0x7fffffff}, {0x7}, {0x1, 0x0, 0x81}, {0xa35, 0x0, 0x3}, {0x5, 0x0, 0x6}]}]}, 0x14c}}, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x1) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfeb8) 22:51:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20002, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="48003c1d68e7cd642c4c9509636d047e00000a00140000000000000000001500010014000100ff0100000000b1fd8666bbae33fe8000b124311500000000000000000000000000000000000000000043976e7a56f600d3d05eaa7914c053250615069ee22b6ea841044e1622f197a7137f6652016d8ddba72b091671e6eee26f8e312361e2cc415e6eb395b579354f0170b01dc39dc2e9d090273ef2d4"], 0x48}}, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100)=0x1f, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f0000000140)=0x9, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0xdf000000, 0x0, 0x4000}, 0x2c) 22:51:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\xe4', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x83c}, 0x28) 22:51:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20002, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="48003c1d68e7cd642c4c9509636d047e00000a00140000000000000000001500010014000100ff0100000000b1fd8666bbae33fe8000b124311500000000000000000000000000000000000000000043976e7a56f600d3d05eaa7914c053250615069ee22b6ea841044e1622f197a7137f6652016d8ddba72b091671e6eee26f8e312361e2cc415e6eb395b579354f0170b01dc39dc2e9d090273ef2d4"], 0x48}}, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100)=0x1f, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f0000000140)=0x9, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:10 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x210000, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = socket$kcm(0xa, 0x2, 0x11) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) setsockopt$sock_attach_bpf(r1, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x83d}, 0x28) 22:51:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x800000000, 0x0, 0x4000}, 0x2c) 22:51:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r2, 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r2, r4) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080), 0x4) 22:51:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x83e}, 0x28) 22:51:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:11 executing program 1: r0 = socket$kcm(0xa, 0x7, 0x11) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x46, "3d69197c6c6aa01c33f810436cae81ecf7e310a43ddaecefc80e0e54392ecaa5736559ecce96e5549eda5f46f6837110914dd7c10d88891280bc8e5f644b77dea3d482bce99b"}, &(0x7f00000000c0)=0x4e) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmmsg(r4, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r6}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000100)={r2, 0x4}, 0x8) 22:51:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x10000000000000, 0x0, 0x4000}, 0x2c) 22:51:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x83f}, 0x28) 22:51:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x840}, 0x28) 22:51:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:11 executing program 1: ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x29}}}) r0 = socket$kcm(0xa, 0x7, 0x11) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = socket$alg(0x26, 0x5, 0x0) fchmod(r0, 0xe6c1b11ed3b053b6) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') mq_open(&(0x7f0000000140)='ecb-cipher_null\x00', 0x800, 0x4, &(0x7f0000000180)={0x6, 0x3, 0x80000001, 0x100000000, 0x10000, 0x0, 0x2, 0x25}) sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$BLKIOOPT(r4, 0x1279, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000000c0)=0x15, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xc2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f4a, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x301, 0x8, 0xa7, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x1419, 0x3ff, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8080, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) 22:51:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x841}, 0x28) 22:51:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x20400000000000, 0x0, 0x4000}, 0x2c) 22:51:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:11 executing program 1: socket$kcm(0xa, 0x2, 0x11) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x800, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x36, &(0x7f0000000080)=r0, 0xffffffffffffffad) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x14) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) 22:51:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x842}, 0x28) 22:51:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xb) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r2, 0x0, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r4, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x9, &(0x7f00000016c0)=[{&(0x7f00000000c0)="7d40e7ae8a2a4c0f8d4baec56e76ab266529ceaa851dc351b3b37764c297845cafb690822c7f62eec303f32a744a2e529371acd17b08e603df006ba3670b7be6a6ed7b97da4491f41069ec375d98eefcdde7e34e23a6c908a57130c72c310258d76e12b4c190966013acf7f54fe18e493bd6ccb87891abd73913c94f6761ba206211eee37452e49adeff1ae11c66bf1fc7bc438a7a6dc1386eeacff604d79d5e0fee", 0xa2, 0x1}, {&(0x7f0000000200)="c3f7ec71774755ebdd1c346daf861a2fa6b29586c4abc52430b9ff65a632b6359a412bebed035de9e45ec2463a44deca6b5a16fe1af86edd10737f4e9f69842f9b0d4cb93c6b5e5b7044f34ea902679a8d9724914075a01049dcc95cec1aeb41600e9858236a6310e86db5d02ecfd0915f2fb6a4cc1e28b3536895ed7644e38d752bd1f84415c2f1fda26730c24e48", 0x8f, 0xfffffffffffffff9}, {&(0x7f00000002c0)="86a631f9beaf639ab9f49f32528733d6e972984a4d5f5138355f186025cbe551141ff52e9b1c9cffdae79d0c0b549d7c08f838a967d5dca0bf07659fcdab6c5b90ea53d53f9a54f836af3929efba5f1af809ffe54c6e1f17a26dfbf8569582fae1dce3ecba5dd1d3bc087868aeaf02129ed28acb9ffe368deaebbd03e8cd28fff3b42ad45d5c841412b2372b832e78a891618c24eb8f9c9a0e97c3d4a422a0f34c15fa12d0500e616fb792453831fa0b52ceeca3b268bbd4df4c252e8f84fbbab01bbca30c4e54310620bc80a9858679bd7100d472ddb5c03fb1892309d2726d101f0075", 0xe4, 0x43}, {&(0x7f00000003c0)="178f4cf4e0bab9605424627a0e12ceaf28b5b1d8729c87e7f23eee47042a6010a8d088bf6e0adcd2e72e32c1220b4df80a29b117d02023749a6fde84e42486d7d1f24b7be2c97a4b5f6d4fb3514b60a490b14c33987b6429cac49fa3b231dae9fcfeffcd3cbccfde259d33f8a153a0346ba0050873a0d929de622f818fa459914491", 0x82, 0x7}, {&(0x7f0000000480)="667645edcfa49ab008d981b1874c5c355f4a39e2e00de4771663d6bf6ca2660934be27dc019e8c3e4fdbba7f440076d0297a9a2878df3b644267b090a0758092887c4b3ead971dd68f09f9d43ec4b53dc94a97d63896a6d7dae697cc4f2953926983d8b8b64244554aaaaa7671667ba593eb5a81dc74100d2f5c516fe147af235f223a21", 0x84, 0x40}, {&(0x7f0000000540)="0858c9d953fe875acc0a1b8711211c65ea31ea5ad97cdf29bca18649e0d19b3866c8ecd27093d0bb6471636e39998586f152446a003db39ac853f5f9a69fe378b6f19043fac4de2244a5b952a24ad600ab2677134d610ed1585c37e184a6ff36", 0x60, 0xffffffff}, {&(0x7f00000005c0)="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", 0x1000, 0xfff}, {&(0x7f00000015c0)="bb49d9993b9ebee11cc80171205996e9dfb3304106c4e337271728b1f69f847b0292e2e7731e8e87708408f327d43fe8bdf565c2ee9fbb697444f04c1027ad48292b0aee12403cb8863cd78a2df83d81f75acd2f62fec25b80bb3841582d64b4d2738f8216d6b2944bbf3d10bcad85e242c6716468184a0067d6ddb2a81a72ba6249a5fd93ef248465ae58d401597cef98448db3b56f56522ae9c1d8d81aef6fb7068b6089bffed9ec1b3d2165", 0xad, 0x2}, {&(0x7f0000001680)="a57fd0ccf923b3328954c5b3e46597aa4b760ef2e5d530d6f7574ec26e25bb2282ce", 0x22, 0x101}], 0x200020, &(0x7f00000017c0)={[{@qnoenforce='qnoenforce'}, {@nobarrier='nobarrier'}, {@inode32='inode32'}], [{@smackfsfloor={'smackfsfloor'}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_user={'subj_user'}}, {@fowner_gt={'fowner>', r4}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@seclabel='seclabel'}]}) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) 22:51:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x40000000000000, 0x0, 0x4000}, 0x2c) 22:51:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\xff', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x843}, 0x28) 22:51:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000030, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) recvfrom(r4, &(0x7f00000002c0)=""/204, 0xcc, 0x1, &(0x7f00000003c0)=@nl=@unspec, 0x80) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='skcipher\x00', 0xfffffffffffffff9) connect$ax25(r2, &(0x7f0000000000)={{0x3, @null, 0x6}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 22:51:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x100000000000000, 0x0, 0x4000}, 0x2c) 22:51:12 executing program 1: r0 = socket$kcm(0xa, 0x7, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000040)=0x9, 0x4) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r5, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r6}, 0x33) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', r6}) 22:51:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x844}, 0x28) 22:51:12 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) r2 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffff, 0x146480) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fsetxattr(r5, &(0x7f0000000500)=@known='security.apparmor\x00', &(0x7f0000000540)='self\x00', 0x5, 0x2) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r6, 0x0, 0x50000000000443) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r6, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8}, 0x0, 0x0, &(0x7f0000000300)={0x3, 0xf, 0x463ce54a, 0xffffffff}, &(0x7f0000000340)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x100000001}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x12, &(0x7f0000000240)=')em0#GPLppp0]!.\\/\x00', r7}, 0x30) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f00000000c0)) r8 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000580)={'ip6tnl0\x00', 0x9}) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r8, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xb) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r2, 0x0, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r4, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x9, &(0x7f00000016c0)=[{&(0x7f00000000c0)="7d40e7ae8a2a4c0f8d4baec56e76ab266529ceaa851dc351b3b37764c297845cafb690822c7f62eec303f32a744a2e529371acd17b08e603df006ba3670b7be6a6ed7b97da4491f41069ec375d98eefcdde7e34e23a6c908a57130c72c310258d76e12b4c190966013acf7f54fe18e493bd6ccb87891abd73913c94f6761ba206211eee37452e49adeff1ae11c66bf1fc7bc438a7a6dc1386eeacff604d79d5e0fee", 0xa2, 0x1}, {&(0x7f0000000200)="c3f7ec71774755ebdd1c346daf861a2fa6b29586c4abc52430b9ff65a632b6359a412bebed035de9e45ec2463a44deca6b5a16fe1af86edd10737f4e9f69842f9b0d4cb93c6b5e5b7044f34ea902679a8d9724914075a01049dcc95cec1aeb41600e9858236a6310e86db5d02ecfd0915f2fb6a4cc1e28b3536895ed7644e38d752bd1f84415c2f1fda26730c24e48", 0x8f, 0xfffffffffffffff9}, {&(0x7f00000002c0)="86a631f9beaf639ab9f49f32528733d6e972984a4d5f5138355f186025cbe551141ff52e9b1c9cffdae79d0c0b549d7c08f838a967d5dca0bf07659fcdab6c5b90ea53d53f9a54f836af3929efba5f1af809ffe54c6e1f17a26dfbf8569582fae1dce3ecba5dd1d3bc087868aeaf02129ed28acb9ffe368deaebbd03e8cd28fff3b42ad45d5c841412b2372b832e78a891618c24eb8f9c9a0e97c3d4a422a0f34c15fa12d0500e616fb792453831fa0b52ceeca3b268bbd4df4c252e8f84fbbab01bbca30c4e54310620bc80a9858679bd7100d472ddb5c03fb1892309d2726d101f0075", 0xe4, 0x43}, {&(0x7f00000003c0)="178f4cf4e0bab9605424627a0e12ceaf28b5b1d8729c87e7f23eee47042a6010a8d088bf6e0adcd2e72e32c1220b4df80a29b117d02023749a6fde84e42486d7d1f24b7be2c97a4b5f6d4fb3514b60a490b14c33987b6429cac49fa3b231dae9fcfeffcd3cbccfde259d33f8a153a0346ba0050873a0d929de622f818fa459914491", 0x82, 0x7}, {&(0x7f0000000480)="667645edcfa49ab008d981b1874c5c355f4a39e2e00de4771663d6bf6ca2660934be27dc019e8c3e4fdbba7f440076d0297a9a2878df3b644267b090a0758092887c4b3ead971dd68f09f9d43ec4b53dc94a97d63896a6d7dae697cc4f2953926983d8b8b64244554aaaaa7671667ba593eb5a81dc74100d2f5c516fe147af235f223a21", 0x84, 0x40}, {&(0x7f0000000540)="0858c9d953fe875acc0a1b8711211c65ea31ea5ad97cdf29bca18649e0d19b3866c8ecd27093d0bb6471636e39998586f152446a003db39ac853f5f9a69fe378b6f19043fac4de2244a5b952a24ad600ab2677134d610ed1585c37e184a6ff36", 0x60, 0xffffffff}, {&(0x7f00000005c0)="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", 0x1000, 0xfff}, {&(0x7f00000015c0)="bb49d9993b9ebee11cc80171205996e9dfb3304106c4e337271728b1f69f847b0292e2e7731e8e87708408f327d43fe8bdf565c2ee9fbb697444f04c1027ad48292b0aee12403cb8863cd78a2df83d81f75acd2f62fec25b80bb3841582d64b4d2738f8216d6b2944bbf3d10bcad85e242c6716468184a0067d6ddb2a81a72ba6249a5fd93ef248465ae58d401597cef98448db3b56f56522ae9c1d8d81aef6fb7068b6089bffed9ec1b3d2165", 0xad, 0x2}, {&(0x7f0000001680)="a57fd0ccf923b3328954c5b3e46597aa4b760ef2e5d530d6f7574ec26e25bb2282ce", 0x22, 0x101}], 0x200020, &(0x7f00000017c0)={[{@qnoenforce='qnoenforce'}, {@nobarrier='nobarrier'}, {@inode32='inode32'}], [{@smackfsfloor={'smackfsfloor'}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_user={'subj_user'}}, {@fowner_gt={'fowner>', r4}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@seclabel='seclabel'}]}) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x845}, 0x28) 22:51:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x200000000000000, 0x0, 0x4000}, 0x2c) 22:51:12 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x11) fstatfs(0xffffffffffffffff, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x20001) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r3, 0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(0xfffffffffffffffd, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x2000000, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x800}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffc00}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x3800}}], [{@measure='measure'}, {@dont_appraise='dont_appraise'}]}}) 22:51:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x846}, 0x28) 22:51:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x600000000000000, 0x0, 0x4000}, 0x2c) 22:51:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x847}, 0x28) 22:51:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xb) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r2, 0x0, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r4, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x9, &(0x7f00000016c0)=[{&(0x7f00000000c0)="7d40e7ae8a2a4c0f8d4baec56e76ab266529ceaa851dc351b3b37764c297845cafb690822c7f62eec303f32a744a2e529371acd17b08e603df006ba3670b7be6a6ed7b97da4491f41069ec375d98eefcdde7e34e23a6c908a57130c72c310258d76e12b4c190966013acf7f54fe18e493bd6ccb87891abd73913c94f6761ba206211eee37452e49adeff1ae11c66bf1fc7bc438a7a6dc1386eeacff604d79d5e0fee", 0xa2, 0x1}, {&(0x7f0000000200)="c3f7ec71774755ebdd1c346daf861a2fa6b29586c4abc52430b9ff65a632b6359a412bebed035de9e45ec2463a44deca6b5a16fe1af86edd10737f4e9f69842f9b0d4cb93c6b5e5b7044f34ea902679a8d9724914075a01049dcc95cec1aeb41600e9858236a6310e86db5d02ecfd0915f2fb6a4cc1e28b3536895ed7644e38d752bd1f84415c2f1fda26730c24e48", 0x8f, 0xfffffffffffffff9}, {&(0x7f00000002c0)="86a631f9beaf639ab9f49f32528733d6e972984a4d5f5138355f186025cbe551141ff52e9b1c9cffdae79d0c0b549d7c08f838a967d5dca0bf07659fcdab6c5b90ea53d53f9a54f836af3929efba5f1af809ffe54c6e1f17a26dfbf8569582fae1dce3ecba5dd1d3bc087868aeaf02129ed28acb9ffe368deaebbd03e8cd28fff3b42ad45d5c841412b2372b832e78a891618c24eb8f9c9a0e97c3d4a422a0f34c15fa12d0500e616fb792453831fa0b52ceeca3b268bbd4df4c252e8f84fbbab01bbca30c4e54310620bc80a9858679bd7100d472ddb5c03fb1892309d2726d101f0075", 0xe4, 0x43}, {&(0x7f00000003c0)="178f4cf4e0bab9605424627a0e12ceaf28b5b1d8729c87e7f23eee47042a6010a8d088bf6e0adcd2e72e32c1220b4df80a29b117d02023749a6fde84e42486d7d1f24b7be2c97a4b5f6d4fb3514b60a490b14c33987b6429cac49fa3b231dae9fcfeffcd3cbccfde259d33f8a153a0346ba0050873a0d929de622f818fa459914491", 0x82, 0x7}, {&(0x7f0000000480)="667645edcfa49ab008d981b1874c5c355f4a39e2e00de4771663d6bf6ca2660934be27dc019e8c3e4fdbba7f440076d0297a9a2878df3b644267b090a0758092887c4b3ead971dd68f09f9d43ec4b53dc94a97d63896a6d7dae697cc4f2953926983d8b8b64244554aaaaa7671667ba593eb5a81dc74100d2f5c516fe147af235f223a21", 0x84, 0x40}, {&(0x7f0000000540)="0858c9d953fe875acc0a1b8711211c65ea31ea5ad97cdf29bca18649e0d19b3866c8ecd27093d0bb6471636e39998586f152446a003db39ac853f5f9a69fe378b6f19043fac4de2244a5b952a24ad600ab2677134d610ed1585c37e184a6ff36", 0x60, 0xffffffff}, {&(0x7f00000005c0)="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", 0x1000, 0xfff}, {&(0x7f00000015c0)="bb49d9993b9ebee11cc80171205996e9dfb3304106c4e337271728b1f69f847b0292e2e7731e8e87708408f327d43fe8bdf565c2ee9fbb697444f04c1027ad48292b0aee12403cb8863cd78a2df83d81f75acd2f62fec25b80bb3841582d64b4d2738f8216d6b2944bbf3d10bcad85e242c6716468184a0067d6ddb2a81a72ba6249a5fd93ef248465ae58d401597cef98448db3b56f56522ae9c1d8d81aef6fb7068b6089bffed9ec1b3d2165", 0xad, 0x2}, {&(0x7f0000001680)="a57fd0ccf923b3328954c5b3e46597aa4b760ef2e5d530d6f7574ec26e25bb2282ce", 0x22, 0x101}], 0x200020, &(0x7f00000017c0)={[{@qnoenforce='qnoenforce'}, {@nobarrier='nobarrier'}, {@inode32='inode32'}], [{@smackfsfloor={'smackfsfloor'}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_user={'subj_user'}}, {@fowner_gt={'fowner>', r4}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@seclabel='seclabel'}]}) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x848}, 0x28) 22:51:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x3f00000000000000, 0x0, 0x4000}, 0x2c) 22:51:13 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000000)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={r5, @in={{0x2, 0x4e24, @multicast1}}, 0x29c, 0x7, 0x0, 0x2, 0x40}, &(0x7f0000000200)=0x98) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r6, 0x0, 0x50000000000443) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r7, 0x84, 0x23, &(0x7f0000000000)={r9}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r9, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r10, @in6={{0xa, 0x4e21, 0x2, @local, 0x9}}, 0x6, 0x7, 0x2, 0x9, 0x10}, 0x98) r11 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r11, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x849}, 0x28) 22:51:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:13 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) r2 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffff, 0x146480) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fsetxattr(r5, &(0x7f0000000500)=@known='security.apparmor\x00', &(0x7f0000000540)='self\x00', 0x5, 0x2) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r6, 0x0, 0x50000000000443) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r6, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8}, 0x0, 0x0, &(0x7f0000000300)={0x3, 0xf, 0x463ce54a, 0xffffffff}, &(0x7f0000000340)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x100000001}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x12, &(0x7f0000000240)=')em0#GPLppp0]!.\\/\x00', r7}, 0x30) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f00000000c0)) r8 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000580)={'ip6tnl0\x00', 0x9}) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r8, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:13 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'veth1_to_bond\x00', {0x2, 0x4e22, @loopback}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r2, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18, 0x71, 0x2, {{0x2, 0x0, 0x8}}}, 0x18) 22:51:13 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x2) 22:51:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x84a}, 0x28) 22:51:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x4000000000000000, 0x0, 0x4000}, 0x2c) 22:51:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xb) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r2, 0x0, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r4, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x9, &(0x7f00000016c0)=[{&(0x7f00000000c0)="7d40e7ae8a2a4c0f8d4baec56e76ab266529ceaa851dc351b3b37764c297845cafb690822c7f62eec303f32a744a2e529371acd17b08e603df006ba3670b7be6a6ed7b97da4491f41069ec375d98eefcdde7e34e23a6c908a57130c72c310258d76e12b4c190966013acf7f54fe18e493bd6ccb87891abd73913c94f6761ba206211eee37452e49adeff1ae11c66bf1fc7bc438a7a6dc1386eeacff604d79d5e0fee", 0xa2, 0x1}, {&(0x7f0000000200)="c3f7ec71774755ebdd1c346daf861a2fa6b29586c4abc52430b9ff65a632b6359a412bebed035de9e45ec2463a44deca6b5a16fe1af86edd10737f4e9f69842f9b0d4cb93c6b5e5b7044f34ea902679a8d9724914075a01049dcc95cec1aeb41600e9858236a6310e86db5d02ecfd0915f2fb6a4cc1e28b3536895ed7644e38d752bd1f84415c2f1fda26730c24e48", 0x8f, 0xfffffffffffffff9}, {&(0x7f00000002c0)="86a631f9beaf639ab9f49f32528733d6e972984a4d5f5138355f186025cbe551141ff52e9b1c9cffdae79d0c0b549d7c08f838a967d5dca0bf07659fcdab6c5b90ea53d53f9a54f836af3929efba5f1af809ffe54c6e1f17a26dfbf8569582fae1dce3ecba5dd1d3bc087868aeaf02129ed28acb9ffe368deaebbd03e8cd28fff3b42ad45d5c841412b2372b832e78a891618c24eb8f9c9a0e97c3d4a422a0f34c15fa12d0500e616fb792453831fa0b52ceeca3b268bbd4df4c252e8f84fbbab01bbca30c4e54310620bc80a9858679bd7100d472ddb5c03fb1892309d2726d101f0075", 0xe4, 0x43}, {&(0x7f00000003c0)="178f4cf4e0bab9605424627a0e12ceaf28b5b1d8729c87e7f23eee47042a6010a8d088bf6e0adcd2e72e32c1220b4df80a29b117d02023749a6fde84e42486d7d1f24b7be2c97a4b5f6d4fb3514b60a490b14c33987b6429cac49fa3b231dae9fcfeffcd3cbccfde259d33f8a153a0346ba0050873a0d929de622f818fa459914491", 0x82, 0x7}, {&(0x7f0000000480)="667645edcfa49ab008d981b1874c5c355f4a39e2e00de4771663d6bf6ca2660934be27dc019e8c3e4fdbba7f440076d0297a9a2878df3b644267b090a0758092887c4b3ead971dd68f09f9d43ec4b53dc94a97d63896a6d7dae697cc4f2953926983d8b8b64244554aaaaa7671667ba593eb5a81dc74100d2f5c516fe147af235f223a21", 0x84, 0x40}, {&(0x7f0000000540)="0858c9d953fe875acc0a1b8711211c65ea31ea5ad97cdf29bca18649e0d19b3866c8ecd27093d0bb6471636e39998586f152446a003db39ac853f5f9a69fe378b6f19043fac4de2244a5b952a24ad600ab2677134d610ed1585c37e184a6ff36", 0x60, 0xffffffff}, {&(0x7f00000005c0)="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", 0x1000, 0xfff}, {&(0x7f00000015c0)="bb49d9993b9ebee11cc80171205996e9dfb3304106c4e337271728b1f69f847b0292e2e7731e8e87708408f327d43fe8bdf565c2ee9fbb697444f04c1027ad48292b0aee12403cb8863cd78a2df83d81f75acd2f62fec25b80bb3841582d64b4d2738f8216d6b2944bbf3d10bcad85e242c6716468184a0067d6ddb2a81a72ba6249a5fd93ef248465ae58d401597cef98448db3b56f56522ae9c1d8d81aef6fb7068b6089bffed9ec1b3d2165", 0xad, 0x2}, {&(0x7f0000001680)="a57fd0ccf923b3328954c5b3e46597aa4b760ef2e5d530d6f7574ec26e25bb2282ce", 0x22, 0x101}], 0x200020, &(0x7f00000017c0)={[{@qnoenforce='qnoenforce'}, {@nobarrier='nobarrier'}, {@inode32='inode32'}], [{@smackfsfloor={'smackfsfloor'}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_user={'subj_user'}}, {@fowner_gt={'fowner>', r4}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@seclabel='seclabel'}]}) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000)=0x8, 0x1) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x84b}, 0x28) 22:51:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x84c}, 0x28) 22:51:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:14 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x2, 0xaf96d0763ed2b00, 0x0, 0x9, r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x8000000000000000, 0x0, 0x4000}, 0x2c) 22:51:14 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'veth1_to_bond\x00', {0x2, 0x4e22, @loopback}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r2, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18, 0x71, 0x2, {{0x2, 0x0, 0x8}}}, 0x18) 22:51:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8a40066443fe994b, @perf_config_ext={0x0, 0x800000000}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x84d}, 0x28) 22:51:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000)=0x8, 0x1) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1000f, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000100)=0x15f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$kcm(0xa, 0x2, 0x11) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_attach_bpf(r7, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r7, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)=""/65, 0x41}], 0x1, &(0x7f00000002c0)=""/227, 0xe3}, 0x100) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000480)=0x68) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xca00, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r2, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0xdf00000000000000, 0x0, 0x4000}, 0x2c) 22:51:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x84e}, 0x28) 22:51:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x6) 22:51:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)=""/65, 0x41}], 0x1, &(0x7f00000002c0)=""/227, 0xe3}, 0x100) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000480)=0x68) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xca00, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r2, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000)=0x8, 0x1) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x84f}, 0x28) 22:51:15 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x6, 0x3, {0x7ef2aa2a8d12083b, 0x3, 0x88bd, 0x3fba7e1c7bf731be, 0x3}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000000200)={0x5, 0x2, @stop_pts=0x8}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xf2) 22:51:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0xffffffff00000000, 0x0, 0x4000}, 0x2c) 22:51:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1000f, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000100)=0x15f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$kcm(0xa, 0x2, 0x11) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_attach_bpf(r7, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r7, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x850}, 0x28) 22:51:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(r0, &(0x7f00000000c0)=@can, &(0x7f0000000040)=0x80, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x2, 0x4000}, 0x2c) 22:51:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x851}, 0x28) 22:51:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000)=0x8, 0x1) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1000f, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000100)=0x15f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$kcm(0xa, 0x2, 0x11) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_attach_bpf(r7, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r7, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0xc40ab2d83ddf3907, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x852}, 0x28) 22:51:16 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7fff, 0x20140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r3, 0x1, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000040}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="04002cbd70004c54fedb5f25010000000000000001410000001c0017000000090000000869623a76657468315f746f5f68737200"], 0x38}, 0x1, 0x0, 0x0, 0x44047}, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r4, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1000f, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000100)=0x15f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$kcm(0xa, 0x2, 0x11) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_attach_bpf(r7, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r7, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x6, 0x4000}, 0x2c) 22:51:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x853}, 0x28) 22:51:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1000f, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000100)=0x15f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$kcm(0xa, 0x2, 0x11) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_attach_bpf(r7, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r7, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@loopback, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080)=r2, 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000000c0)) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20080, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x4, 0x9c, [], 0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000200)=""/156}, &(0x7f0000000040)=0x78) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x20, 0x2, 0x6, 0x40, 0x0, 0x6, 0x90001, 0x4, 0x401, 0x1, 0x9, 0x4, 0xfada, 0x1, 0x6093, 0x6, 0x7, 0x5, 0x1, 0x9, 0x100, 0x0, 0x0, 0x6ec, 0x100000001, 0x0, 0xf67, 0x1, 0x2a, 0x8, 0x1, 0x9, 0x2, 0x5, 0x3, 0x200, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000140), 0xc}, 0x20a0a, 0x9, 0x81, 0x6, 0x4, 0x6f3f, 0x100000001}, r5, 0x2, r1, 0x2) 22:51:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x8, 0x4000}, 0x2c) 22:51:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x854}, 0x28) 22:51:16 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7fff, 0x20140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r3, 0x1, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000040}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="04002cbd70004c54fedb5f25010000000000000001410000001c0017000000090000000869623a76657468315f746f5f68737200"], 0x38}, 0x1, 0x0, 0x0, 0x44047}, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r4, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000080), 0xfcf3) 22:51:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x855}, 0x28) 22:51:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x43, &(0x7f0000000080), 0xfcf3) 22:51:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x10, 0x4000}, 0x2c) 22:51:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x856}, 0x28) 22:51:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x33, &(0x7f0000000080), 0xfcf3) 22:51:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, &(0x7f0000000080), 0xfcf3) 22:51:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x857}, 0x28) 22:51:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0xdf, 0x4000}, 0x2c) 22:51:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x18, &(0x7f0000000080), 0xfcf3) 22:51:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, &(0x7f0000000080), 0xfcf3) 22:51:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x858}, 0x28) 22:51:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x600, 0x4000}, 0x2c) 22:51:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x12, &(0x7f0000000080), 0xfcf3) 22:51:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x12, &(0x7f0000000080), 0xfcf3) 22:51:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x859}, 0x28) 22:51:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x3) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x401, 0x6, 0x8, 0x7, 0x6, 0x1, 0xff, 0xb8, r4}, &(0x7f0000000040)=0x20) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r6, 0x0, 0x0) r7 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r7, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r9 = getpid() fstat(r7, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() sendmsg$unix(r8, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r7, @ANYRESHEX, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRESHEX, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7, @ANYRES32=r7], 0xc0, 0x40010}, 0x8000) chown(&(0x7f00000000c0)='./file0\x00', r6, r11) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000080), 0xfcf3) 22:51:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x2, &(0x7f0000000080), 0xfcf3) 22:51:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x85a}, 0x28) 22:51:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x3f00, 0x4000}, 0x2c) 22:51:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7000000000000000, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000040)={0x1000000000000000, 0xc000, 0x79, 0x8, 0x1}) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000200)={0x7, @random="75ad44f34651"}) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000240)="d8eeb7438c56ebae295e4003d78c30b1b9048b20ccb5ef85962ecfe2054ed4ed38d89947c8abc0c9b2d649b15c221012cecf14bce35395f3603d1b6b3edbe63412142b28ff74bae15f3bd78c95f8090a0896303a23fb24a177c24918627a665c3dd8", 0x62) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) move_mount(r4, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x4) r5 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r5, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r5, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r6 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x10001, 0x40400) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="fdd592caa23f05930778ae57f88f60cc534695bb23b80ade3a270621c863d7a1db06168e0079452fce17b409ca364e9c98046ca9a8177c69ecd0a1bc27cb4ca22da7cd284ee6597193cde202737cdf9ef2bacd32c606b8abfd1276dc", 0x5c) 22:51:18 executing program 1 (fault-call:4 fault-nth:0): r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:18 executing program 3 (fault-call:3 fault-nth:0): sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) [ 1602.806456][T23455] FAULT_INJECTION: forcing a failure. [ 1602.806456][T23455] name failslab, interval 1, probability 0, space 0, times 0 22:51:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x85b}, 0x28) [ 1602.860254][T23455] CPU: 1 PID: 23455 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 1602.869414][T23455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1602.879477][T23455] Call Trace: [ 1602.882785][T23455] dump_stack+0x172/0x1f0 [ 1602.887117][T23455] should_fail.cold+0xa/0x15 [ 1602.891717][T23455] ? fault_create_debugfs_attr+0x180/0x180 [ 1602.897542][T23455] __should_failslab+0x121/0x190 [ 1602.902495][T23455] should_failslab+0x9/0x14 [ 1602.907011][T23455] kmem_cache_alloc_trace+0x4b/0x790 [ 1602.912307][T23455] ? igmp6_group_dropped+0x1ae/0x8c0 [ 1602.917624][T23455] ? __local_bh_enable_ip+0x15a/0x270 [ 1602.923008][T23455] igmp6_group_dropped+0x3e1/0x8c0 [ 1602.928131][T23455] ? igmp6_send+0x13f0/0x13f0 [ 1602.928146][T23455] ? trace_hardirqs_on+0x67/0x240 [ 1602.928160][T23455] ? __ipv6_dev_mc_dec+0x1ed/0x300 [ 1602.928176][T23455] ? __local_bh_enable_ip+0x15a/0x270 [ 1602.928193][T23455] __ipv6_dev_mc_dec+0x1f5/0x300 [ 1602.928210][T23455] ipv6_sock_mc_drop+0x393/0x5b0 [ 1602.928234][T23455] do_ipv6_setsockopt.isra.0+0x74a/0x4100 [ 1602.928257][T23455] ? ipv6_update_options+0x3b0/0x3b0 [ 1602.928272][T23455] ? lock_downgrade+0x920/0x920 [ 1602.928290][T23455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1602.928309][T23455] ? __kasan_check_read+0x11/0x20 [ 1602.985364][T23455] ? mark_lock+0xc2/0x1220 [ 1602.989792][T23455] ? __kasan_check_read+0x11/0x20 [ 1602.994826][T23455] ? mark_lock+0xc2/0x1220 [ 1602.999256][T23455] ? __kasan_check_read+0x11/0x20 [ 1603.004288][T23455] ? __lock_acquire+0x16f2/0x4a00 [ 1603.009320][T23455] ? __kasan_check_read+0x11/0x20 [ 1603.014350][T23455] ? mark_lock+0xc2/0x1220 [ 1603.018774][T23455] ? find_held_lock+0x35/0x130 [ 1603.023539][T23455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1603.029772][T23455] ? __kasan_check_read+0x11/0x20 [ 1603.034787][T23455] ? __lock_acquire+0x8a0/0x4a00 [ 1603.039708][T23455] ? __kasan_check_read+0x11/0x20 [ 1603.044715][T23455] ? mark_lock+0xc2/0x1220 [ 1603.049114][T23455] ? _parse_integer+0x190/0x190 [ 1603.053947][T23455] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1603.060168][T23455] ? aa_label_sk_perm+0x101/0x560 [ 1603.065174][T23455] ? __fget+0x35d/0x560 [ 1603.069314][T23455] ? aa_profile_af_perm+0x320/0x320 [ 1603.074490][T23455] ? __fget+0x35d/0x560 [ 1603.078637][T23455] ? lock_downgrade+0x920/0x920 [ 1603.083490][T23455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1603.089714][T23455] ? __kasan_check_read+0x11/0x20 [ 1603.094725][T23455] ? ___might_sleep+0x163/0x280 [ 1603.099576][T23455] ? __might_sleep+0x95/0x190 [ 1603.104253][T23455] ipv6_setsockopt+0xf6/0x170 [ 1603.108913][T23455] ? ipv6_setsockopt+0xf6/0x170 [ 1603.113745][T23455] udpv6_setsockopt+0x68/0xb0 [ 1603.118409][T23455] sock_common_setsockopt+0x94/0xd0 [ 1603.123591][T23455] __sys_setsockopt+0x261/0x4c0 [ 1603.128427][T23455] ? sock_create_kern+0x50/0x50 [ 1603.133299][T23455] ? fput+0x1b/0x20 [ 1603.137102][T23455] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1603.142542][T23455] ? do_syscall_64+0x26/0x760 [ 1603.147203][T23455] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1603.153249][T23455] ? do_syscall_64+0x26/0x760 [ 1603.157909][T23455] __x64_sys_setsockopt+0xbe/0x150 [ 1603.163003][T23455] do_syscall_64+0xfa/0x760 [ 1603.167491][T23455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1603.173365][T23455] RIP: 0033:0x4598e9 [ 1603.177252][T23455] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1603.196835][T23455] RSP: 002b:00007f02f685cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 22:51:18 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x4000, 0x4000}, 0x2c) [ 1603.205226][T23455] RAX: ffffffffffffffda RBX: 00007f02f685cc90 RCX: 00000000004598e9 [ 1603.213787][T23455] RDX: 0000000000000015 RSI: 0000000000000029 RDI: 0000000000000003 [ 1603.221738][T23455] RBP: 000000000075bf20 R08: 000000000000fcf3 R09: 0000000000000000 [ 1603.229692][T23455] R10: 0000000020000080 R11: 0000000000000246 R12: 00007f02f685d6d4 [ 1603.237642][T23455] R13: 00000000004c8313 R14: 00000000004ded00 R15: 0000000000000005 22:51:18 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xcc190}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) 22:51:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x85c}, 0x28) 22:51:18 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x48088, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'yam0\x00', 0x200}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='hybla\x00', 0x6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)=0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) sendfile(r7, r9, 0x0, 0xc) sendto$isdn(r8, &(0x7f00000002c0)={0x9, 0xfffffffffffffffe, "df2d3092a83a31a4d5a7f2df43717e40c795f0bafbb518df224bf8a0eeed7fa75eae4e037b7ae7b2ad1320f09671ffbd2ffda7a55be1411554cbd6cdbab341f2854d4592bafad045aa69bb3c926fe3ed517687095ba72d158de58bef22f4de353bb540f538cac461ed3b3db111575eb6a6f623069523efec7053915f2398f26f5d51ed7492e85f33046fb5b7e05a65bc8e4117e9339bc0c6c353a89bfbf8f5cc3781"}, 0xaa, 0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x10001, 0x2, 0x7fff, 0x8, 0x0, 0x1, 0x400, 0x1, 0x7, 0x0, 0x7ff, 0x5, 0x1ff, 0x8, 0xffffffffffffffa7, 0x1, 0xff, 0x0, 0x7, 0x5, 0x434, 0x7, 0xce, 0x7, 0x6, 0x9, 0x4, 0x47, 0x401, 0x6, 0x8, 0x8, 0x2, 0x1, 0x200, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x4, 0x6, 0x2, 0x9, 0xca5e, 0x70, 0x7}, r4, 0x6, r5, 0x8) 22:51:18 executing program 1 (fault-call:4 fault-nth:1): r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0xdf00, 0x4000}, 0x2c) 22:51:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x85d}, 0x28) 22:51:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:19 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:19 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000283, 0x6c00000000000000) 22:51:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x85e}, 0x28) 22:51:19 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x11, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x100000, 0x4000}, 0x2c) 22:51:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:51:19 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x10000, 0x69, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x24000, 0x0) 22:51:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x85f}, 0x28) 22:51:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000020000d0800000000000000b10a001400000000000049c0b7786c830000001500010014000100ff01000000000000000000000000000114000200fe800000000000000000"], 0x48}}, 0x0) recvmmsg(r1, &(0x7f00000039c0), 0x0, 0x40000000, 0x0) ioctl$SIOCAX25DELFWD(0xffffffffffffffff, 0x89eb, &(0x7f0000003bc0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10014}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x30}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000003c80)=@ipv4_newaddr={0x18, 0x14, 0xcd36bdf59fcda2a9, 0x70bd2d, 0x25dfdbfd, {0x2, 0x40, 0xe12a2ff6db6fb9e0}}, 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x4800c0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6369, 0x243080) sendmsg$nl_netfilter(r2, &(0x7f00000021c0)={0x0, 0xfffffffffffffd3a, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x81}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:19 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x88, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000200)) [ 1604.276863][T23642] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 22:51:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x860}, 0x28) 22:51:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x204000, 0x4000}, 0x2c) 22:51:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:19 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "c69e9ae26dcd564c", "a005e7ca37af566cfae556d627c6fd2f", "fb419a67", "943a348cc2107639"}, 0x28) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x861}, 0x28) 22:51:20 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x2, &(0x7f0000000080), 0xfcf3) 22:51:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x862}, 0x28) 22:51:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x400000, 0x4000}, 0x2c) 22:51:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:20 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 22:51:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x402000, 0x4000}, 0x2c) 22:51:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={r0}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042dbd7000ffdbdf25100000000c40020008000400ffffffff0c00030008000300010000001400020008000d00000000ee080006004c729ba6"], 0x40}, 0x1, 0x0, 0x0, 0x10880}, 0x4000000) r6 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r6, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r6, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$GETALL(r7, 0x0, 0xd, &(0x7f0000000100)=""/89) semctl$SETVAL(r7, 0x3, 0x10, &(0x7f00000002c0)=0x28000000000) 22:51:20 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x3, &(0x7f0000000080), 0xfcf3) 22:51:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x863}, 0x28) 22:51:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\xff', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x978, 0x7f, 0x6, 0x4, 0x8000, 0x3, 0x3, 0x0, 0x203, 0x40, 0x1b3, 0x7ff, 0x100, 0x38, 0x1, 0x97e6, 0xbcc, 0x6}, [{0x0, 0x100000000, 0x7744, 0x80000000, 0x9, 0x3, 0x9f, 0x1}], "f7e834b19fafd1c7f2c08d532d5f11c02e256a083fe033b846bf147e44b92e73950c37b3172b1605818eb983c284c8", [[], [], [], [], [], [], [], []]}, 0x8a7) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$TIOCNXCL(r3, 0x540d) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x864}, 0x28) 22:51:20 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x840) r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000020000d08000000002c2400000a00140000000000000000001500010014000100ff01000000000000000000000000000114000200fe8000"/72], 0x48}}, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 22:51:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:20 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x4, &(0x7f0000000080), 0xfcf3) 22:51:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x865}, 0x28) 22:51:21 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'cmac-aes-neon\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000000)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x3, 'syz1\x00', @null, 0x2, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}) 22:51:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x1000000, 0x4000}, 0x2c) 22:51:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000140)=0x461d) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80, 0x400c0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e20, 0x5, @rand_addr="6edbdc0cac9e75b8433593c7b1687276", 0x1}, r3}}, 0x38) r4 = socket$kcm(0xa, 0x2, 0x11) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000380)='/dev/rtc#\x00', 0x0, 0x800) ioctl$int_out(r6, 0x5462, &(0x7f00000003c0)) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x2900, 0x20) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4800000020000d0800000000000000000a00140000000000000000001500010014000100ff0100000000000000000000003f000000000200fe800000000000000000000000000000850f42229098731303d708e80d72bdc8138b01c34d07ad8ce38a7c212d75dd4cc45521928ead4431878ca65f9a167c250fd670f87dd18afbc0b2a99c4f0ebe3ceb21a0fff255718fdc7461ed53bd6e683f5fd5dbf738b01a8e19138160283bbde9056aa9acf597b62b0da05460d2ff8b026bc308dc3df216379b81facfa466cc157d9d6e47322efbc42781e4a56f0ec2110699982722d525160dedeb0a588f"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRESDEC=r7, @ANYRESDEC=r0, @ANYRES16=r8, @ANYRESOCT=r9, @ANYBLOB="8e376fe6a7037ea96080603bc351bbc627efa8d788336a52417f6a7db2ea45866c6991486e3997f084a98ca0151764a746694bd2b94acc5ffd8ef7ed5b57c31bccca665123196c061f9c6a178cec97bc3dc6a8a2e103a8744ed7f9127e25c0e0c67560b01897ac07658bf8737f0cb1f853cc50d31a2fec893022f49eee7c551707575e70d8e290a5b8028e619321948fd8b0c9a7c5e47ce42b524f5913ad40f3d6e671faf2fbe7ac1043f5760d3906125a7f1e36329cfb9f8d1e491705c41de8e0811ceabfc4fe9ad6849b7335e3098d850bb70ddaf369b1cc2555cc0d74a6c0c0ca4ecdbc8908c114a80e1054a27fff48aeacb1bdaa9786cfcd4c"]], 0x1}}, 0x0) setsockopt$sock_attach_bpf(r5, 0x29, 0x14, &(0x7f0000000240), 0x2cb) setsockopt$sock_attach_bpf(r4, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:21 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x5, &(0x7f0000000080), 0xfcf3) 22:51:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x866}, 0x28) 22:51:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\xff', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:21 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) fcntl$setflags(r0, 0x2, 0x2) [ 1606.009375][T24151] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 22:51:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x2, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x867}, 0x28) 22:51:21 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000080)={'teql0\x00', 0x6}) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r7, 0x891a, &(0x7f0000000400)={'bcsf0\x00', {0x2, 0x4e20, @loopback}}) ioctl$EVIOCGPROP(r6, 0x80404509, &(0x7f00000002c0)=""/174) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r9, 0x80184560, &(0x7f0000000100)=""/141) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r8, 0x29, 0xd2, &(0x7f0000000380)={{0xa, 0x4e22, 0x2, @remote, 0x8000}, {0xa, 0x4e20, 0x4397, @dev={0xfe, 0x80, [], 0xa}, 0x8}, 0xcba5, [0x200, 0x4, 0x7, 0x7, 0x5, 0x7, 0x5]}, 0x5c) sendfile(r3, r8, 0x0, 0x50000000000443) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f0000000000)=0xffffffff, 0x4) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:21 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000080), 0xfcf3) 22:51:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x1f, 0x2000) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x2000000, 0x4000}, 0x2c) 22:51:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x868}, 0x28) 22:51:22 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:22 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x8, &(0x7f0000000080), 0xfcf3) 22:51:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) io_setup(0x9, &(0x7f0000000380)=0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_submit(r8, 0x1, &(0x7f0000000a00)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r9, 0x0}]) io_submit(r8, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r9, 0x0}]) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r15 = accept4(r14, 0x0, 0x0, 0x0) r16 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r15, r16, 0x0, 0x50000000000443) r17 = socket$alg(0x26, 0x5, 0x0) bind$alg(r17, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r18 = accept4(r17, 0x0, 0x0, 0x0) r19 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r18, r19, 0x0, 0x50000000000443) r20 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r20, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r21 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0xce, 0x81) r22 = socket$alg(0x26, 0x5, 0x0) bind$alg(r22, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r23 = accept4(r22, 0x0, 0x0, 0x0) r24 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r23, r24, 0x0, 0x50000000000443) r25 = openat(r3, &(0x7f0000000880)='./file0\x00', 0x800, 0x40) r26 = syz_open_dev$mice(&(0x7f0000000900)='/dev/input/mice\x00', 0x0, 0x20a002) r27 = socket$alg(0x26, 0x5, 0x0) bind$alg(r27, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r28 = accept4(r27, 0x0, 0x0, 0x0) r29 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r28, r29, 0x0, 0x50000000000443) r30 = socket$alg(0x26, 0x5, 0x0) bind$alg(r30, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r31 = accept4(r30, 0x0, 0x0, 0x0) r32 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r31, r32, 0x0, 0x50000000000443) r33 = syz_open_procfs$namespace(0x0, &(0x7f0000000bc0)='ns/net\x00') r34 = socket$alg(0x26, 0x5, 0x0) bind$alg(r34, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r35 = accept4(r34, 0x0, 0x0, 0x0) r36 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r35, r36, 0x0, 0x50000000000443) io_submit(r8, 0xa, &(0x7f0000000d40)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xc05720cd5238676d, 0x6, r2, &(0x7f00000002c0)="7b319f1634400450bfed91a68f7b87ed9dbde3dc46df9beb212ec1669b39007d22efaa07cd01608b61035aa6f3880ead18dc7af73f67a72158693bec3f40401a03b6fbc1575b38c5b6d5788850030319fd32d030fca8497469e6325eb95b11d5", 0x60, 0x6, 0x0, 0x0, r12}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x4, 0xffffffff, r13, &(0x7f0000000340)="7b8cd516f7686cacadb03f7cf4c3865344e4b0ccc87242e8a95b960c787f2eee0909256413a10963f4dc436e346982f577807a9133f7b219ed193842a9413d412694201340d3f430745b8e0b1bd3a0cb45aa429d7aae9bc6a0cf5243fa288daa098b40047fb4455fccce0a7bc246e6db318c6d40ef82e464b96d46925dafc2fed9311849961c47a54747de8446db815ef09680762d77d3f13de0cfc151806a4c343472fa9731006adc77f0f7734c0ea25facd01f00846f6d", 0xb8, 0x7, 0x0, 0x2cbb60cfe5c8cd75, r16}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0xfffffffffffffff8, 0xffffffffffffffff, &(0x7f0000000440)="cd6a59a118c6645b11c0966890acde38b0c91101cf01217af9925bd75ee12f9a9dc66bc10b12aac9cc2190715dcc7396ab2a6d40", 0x34, 0xf78, 0x0, 0x1, r19}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x5, 0x0, r20, &(0x7f00000004c0)="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", 0xfb, 0x5, 0x0, 0x2, r21}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x3, 0x4, 0xffffffffffffffff, &(0x7f0000000640)="2e9a791193a5af1f1151404a22434554a3dbcc77e12a0a2e73543deb2bcba4e0f1595909580aa683eee6066b2c91ef6e9d0204629377b8c248a03f6ef2fb9b480df4368875de0fac7bc26d81891313e046c745c9f832483d9e48fb6abfd21d515504af58cbc7cf1a335bc0afd7ff98a13ed3cc7663c970bea3dbd53c4558e771223e04e7f51516b3289051dbbee8f2ce3f4c8d75486ee9a5613b7fe87a238fcbbbd72e3837be134b25d7315613cd18ef0a261a59f2fbbd72b7418bc9434edfc2ed14a376c1ef88f59816b09a2940d3f0011367fc404cdffeef6338dce072c321f77914bf817e2a04", 0xe8, 0x80000000, 0x0, 0x0, r24}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x6, 0x5c7, r6, &(0x7f0000000780)="c90bfe3df637256b15f3b5cccb18b1a4e179f60b44cfaea6a043cf2bb7c86b8cc2f83aac37f70a9607982297bb703ac8fb095d9f62f7a455e20c231e62c5eb95c3a0970a7860c727125bd7453d49e92c75604635c1e27311709a716181b85f4e3e5a7fa6dca77aca1b5dec9df80f98ba36aa596c0922a0d7ee429dea03482b2141d4681d86661554a629ee3aad83bc9136dc1797956cc58499a427ec0478119d0770ec1b51c0a692fc4d075b28361c3194e5a4654ebc67c15d4144b05a1c3ab3e01a29a33467ce4ab2c7db21bed12e45ecb471663376446a95288e33f1600965dfcc6c94e8d6", 0xe6, 0x10000, 0x0, 0x8a2d66715d71dae2, r25}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0xfbae1ead5741b5bc, 0x1, r26, &(0x7f0000000940)="6355f057288f7dc4b55aa736aac90691b6598b4e987552903a516ebf8e8694c41bab07275a11f43b39e0fccab90dcc4a2b3a76e208f513d0a4ec49ca949baa723040d0296ae807f641cd94ee", 0x4c, 0xfffffffffffffff9, 0x0, 0x0, r29}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x6, 0x2d, 0xffffffffffffffff, &(0x7f0000000a00)="35ef063ac0ebdf7c0510ce934828cb42d471576712df354bbac610fe543e61064052627b2857132e4a4d57eb0e0bb6317d92752fb615af21d422f3764f0848dca2ee42e34e3df1fef60b1c38c98c6a628109337a0c54821374428c94f954a278861c182047025db635cd8da903e103dc2904a7d86ad4ca0e544616a1498d1f0f3d193a088d9322d2411b2778", 0x8c, 0x1, 0x0, 0x0, r32}, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x8, 0xff, r0, &(0x7f0000000b00)="851ec0cb2baababcbce8456f7c2d22efc0bb153ba63cb36d1e031e3d031537d5e63f565327332ec901c9eb87618ee98948f6687d589ca02e98f097661ef9d2152f3c9c27886ddea2afecfd7e3b8a978ce64e68b7094bbbadda6f443999633ed3bebe5eca73c4", 0x66, 0x8, 0x0, 0x7}, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x1, 0x0, r33, &(0x7f0000000c00)="614d4c22d0a9ec379f6db81f9ee538e429ebe10ae1b1edd28aea3671ac82c764df0e511e2285f42781821a3fa3f3fa7b8bedc2acb5ead424c94095ddb9abe5a079244edace356451b16f8da518d9c3a0ae2f40315214c3dde1e15879cd948f85c72f33f4ae70382979f4eeab53f71711bef3fb69bf48e071b1d1a56b7144157cc93a930d938544c0806aea83aa83b698a6854660deddab06e3c78e8d4731d34c420c7f99799b187495dda4e9a052b048c70cb1e39aca4267d82d6f418dd96424b87c284aeac45ad09e064405da2d06c67d202a866a6594", 0xd7, 0x0, 0x0, 0x1, r36}]) r37 = accept4(r7, 0x0, 0x0, 0x0) r38 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r37, r38, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_AGP_ALLOC(r38, 0xc0206434, &(0x7f0000000000)={0x40c, 0x0, 0x1}) ioctl$DRM_IOCTL_AGP_FREE(r6, 0x40206435, &(0x7f0000000040)={0x532, r39, 0x0, 0xf7e}) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000000c0)={0xb0, {{0xa, 0x4e24, 0x100000000, @rand_addr="753da7084f48760808e85e95b736f595", 0x3ff}}}, 0x88) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:22 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x73, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000240)="a456211607bc61310e8e79ca88092ce3e1f4c63e3ed4b6202b1fd4e545eedf459fcb48f86179bd068c08414cd8d1cf63a277ae15a66263caa1612791c1afb795777718dc31f32c50ede85cae4e172bc0a173bb93d978c74b2831e0603dacf7a8d7498c14d731e41c6a6d951da840f3a1ffb5d2dc7e116bef", 0x78, 0x8010, &(0x7f00000002c0)={0xa, 0x4e20, 0xfffffffffffffffd, @mcast1, 0x2664}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x4, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x869}, 0x28) 22:51:22 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0xb, &(0x7f0000000080), 0xfcf3) 22:51:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x86a}, 0x28) 22:51:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x6, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x6000000, 0x4000}, 0x2c) 22:51:23 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x88, r1, 0x4, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa85}]}, 0x88}, 0x1, 0x0, 0x0, 0x4}, 0x4088c) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:23 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x10, &(0x7f0000000080), 0xfcf3) 22:51:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x86b}, 0x28) 22:51:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x7, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) accept4(r0, &(0x7f0000000000)=@l2, &(0x7f00000000c0)=0x80, 0x80c00) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x1, 0x0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000240)=0x9) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg$alg(r4, &(0x7f0000000340)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000280)="3bf53c2d3509edc3ae42cf42e767aafa3114ee69b7851255afbaf4ff5379cc034ae8da53a9c507e82355287659fa52d0107a7f57c5af3be4e259330bc7", 0x3d}], 0x1, &(0x7f0000000300)=[@assoc={0x18}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x30, 0x4000000}], 0x1, 0x0) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/27) [ 1607.864052][T24666] Unknown ioctl 1074310738 22:51:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x86c}, 0x28) 22:51:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x8, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:23 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000080), 0xfcf3) 22:51:23 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/96, 0x60}, {&(0x7f0000000100)=""/161, 0xa1}, {&(0x7f00000001c0)=""/111, 0x6f}, {&(0x7f0000000240)=""/84, 0x54}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/209, 0xd1}], 0x6, 0x6c00000000000000) 22:51:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x9, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x86d}, 0x28) 22:51:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x8000000, 0x4000}, 0x2c) 22:51:24 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x12, &(0x7f0000000080), 0xfcf3) 22:51:24 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='net/sockstat\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x5) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) write$P9_RREADDIR(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="c50000050002000000000000020000000400000000000000c8b04a23a04368f2dd25030000000000001f002007002e2f66696c65300401000000060000000000000001000000000000002007002e2f66696c6530000400000001000000000000000700000000000000ff07002e2f66696c653002040000000100000000000000ff070000000000006207002e2f66696c65308b0200000002000000000000000400000149f6dbd8d624582e2f66696c65300002000000050000000000000001000000000000"], 0xc5) 22:51:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0xa, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x86e}, 0x28) 22:51:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x86f}, 0x28) 22:51:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0xb, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80802, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000200)=""/225, &(0x7f0000000040)=0xe1) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000300)={0xe, 0x8, 0x9, 0xfffffffffffffff9, 0xb9, "5a1b59dd86ba0d17ee76636fcf9085b9d3d8cfc79ff951d0013a71a4b1965b27f34350edf3ed397c952edff9114f2b84f2fd76cdafc364dc2d125360dc3a3d37b4e71fa0a0baa1baac0db1cb405fa1f3b8c9ce1b365aac89e126fc118aad4f64a77ab59a9a0146f4bb9f835a98802300ec63df3e48ab4a5b55e1ace363799cf2ebcb23b810e4fc94d144a6d42b62399e113eb9eab8e8d53eaa802bd4db0130c43ca348ff737c0a8ca3006dd98021cf2f4df52356a7e78c598e"}, 0xc5) 22:51:25 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='JJ\xc1\xa4\x84I\x00\x00\x00\x00\x00\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/51, 0x33}, {&(0x7f0000000100)=""/75, 0x4b}, {&(0x7f0000000080)=""/41, 0x29}], 0x13e, 0x0) 22:51:25 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x13, &(0x7f0000000080), 0xfcf3) 22:51:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0xc, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x3f000000, 0x4000}, 0x2c) 22:51:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x870}, 0x28) 22:51:26 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@local, 0x3, 0x2, 0x2, 0x2, 0x7a, 0x6}, 0x20) 22:51:26 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xfcf3) 22:51:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0xd, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x7353f636, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x871}, 0x28) 22:51:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000014c0)='/dev/swradio#\x00', 0x1, 0x2) bind$unix(r0, &(0x7f0000001500)=@file={0x0, './file0\x00'}, 0x6e) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:26 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x100) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000100)="c6f4bc09c05356bca4c5a6316440513cc49bc4f49c969a95cf7e71d8805114f723a576d7cbe770e8644e8f85dd8d704f05f8c376a93dd0f047ee98e76cdce9912de3404f60b6bf4391137869b6df913f1e95db1bb606cd93effba3b774a677d137b8bc72b43a1078505f9d2832abf576ff4149dd9dddf2cadf6ad13bc22bc58cf0b600565a31cb") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) mq_getsetattr(r3, &(0x7f0000000040)={0x8, 0x80000001, 0x1, 0x6, 0x7, 0x9, 0x0, 0xee62}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0xe, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:27 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x16, &(0x7f0000000080), 0xfcf3) 22:51:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x872}, 0x28) 22:51:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x40000000, 0x4000}, 0x2c) 22:51:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0xf, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x873}, 0x28) 22:51:27 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x17, &(0x7f0000000080), 0xfcf3) 22:51:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x10, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x800) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f00000000c0)=""/33) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000000)={0x34, 0x4e, 0x5, 0xa, 0x5, 0x81}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r4, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) bind$bt_l2cap(r7, &(0x7f0000000100)={0x1f, 0x3ff, {0x8, 0x2, 0xf31, 0x205d, 0x7f, 0x5}, 0xed, 0x7f}, 0xe) 22:51:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0xdf000000, 0x4000}, 0x2c) 22:51:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x874}, 0x28) 22:51:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x11, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:27 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x18, &(0x7f0000000080), 0xfcf3) 22:51:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x875}, 0x28) 22:51:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x800000000, 0x4000}, 0x2c) 22:51:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x12, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:28 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000000080), 0xfcf3) 22:51:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x876}, 0x28) 22:51:28 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000000)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000000)={r6, @in6={{0xa, 0x4e24, 0x8, @rand_addr="90d5f3932e0cd271bf0efbc45c47c8cb", 0x91}}}, 0x84) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x13, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) r2 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000200)="48036e0dba336eaac34912ce895b18a9ce2dab07b04337aae86f7544ab54dadba17ebaf8e2db9bc2795bb8bca8bf92bb8cf021b986c1c08fd7e113d99ee3d0c6acb7911dd71687e7ec17d14d555fbf6f0f10e5f7bdfbb32e6dea6100cec7efbb0ae09b08f57a146781400b1d9d9bfde0019d20ddd2cb30473178d3e59a8b2bb4b7d1e9f247fef88ae2937ec7a8322b87fed4fd6e9ecac5d62a8598537eccbff904674861e62905ffbdc2906b4665c2e7be034ed927e4fc33399e5f8c3d9ef92a12fc09", 0xc3, 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r3) add_key(&(0x7f0000000200)='id_legacy\x00', 0x0, 0x0, 0x0, r3) r4 = add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000300)="030a0678f1c047937b4607b7994ca0f1d5fc34057692d0e022f75f27a3fb55d519663fec85def64a7600b9554195d52bd17ecf5dce0b75746f0abc85470e2aea3915ea30", 0x44, r3) r5 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="c3d9c2e92db3d7f03d2a68d0fa796e52b643b7e51c65a9e4f21ee7267df58b198e2e95f63cb4fcfd7cad0e2d483d2d285d70412c63919eaf6ea0f2cf982f27d6b9674bea3b4b24df3c562984986fef4f89a11dcf5ecd028a221954edd0", 0x5d, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000440)={r2, r4, r5}, &(0x7f0000000480)=""/228, 0xe4, &(0x7f00000006c0)={&(0x7f0000000580)={'sha512\x00'}, &(0x7f00000005c0)="65352d4a39a4613841360e489c8e12fc9ba0965f78ab2638907a35d79819a130d01296cdaa0556a4e4a3bf76d5a2943a7c793f34028933e65b72ab4942d7a059d3dc22cd3b842e5afa276cd933422c8d0bb48097defcd80fb875a752eaec4937bed5e9b768d6211c2ef500112addb7a43e464c27e81cf57f99a172e2ea360f7ef5ad3d16514fba55c228f0fd2d12822916b4e9bc01032b65e887aec6ea5651adb62ded2d35663e6836cc03d4633f37937113ea621f15195cd2b719f6ffc353f470f1ab784a627d2949dd37f5761e68f102b9482aa14e91b149cf99d464416dc67757a8cb7264ff58ae46373d", 0xec}) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000700), 0x4) 22:51:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x10000000000000, 0x4000}, 0x2c) 22:51:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x877}, 0x28) 22:51:28 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x1a, &(0x7f0000000080), 0xfcf3) 22:51:28 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1000000, 0x0, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x14, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x878}, 0x28) [ 1613.334948][T25833] encrypted_key: insufficient parameters specified 22:51:28 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:28 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000080), 0xfcf3) 22:51:28 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, r1, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffeffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x224}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x69b0f1cd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x60}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc38}]}]}, 0xbc}}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa8805, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffffffffffd, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x20400000000000, 0x4000}, 0x2c) 22:51:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x879}, 0x28) 22:51:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x15, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa97a, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000000)=0x40, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:29 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') 22:51:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x87a}, 0x28) 22:51:29 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x1c, &(0x7f0000000080), 0xfcf3) 22:51:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x16, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x40000000000000, 0x4000}, 0x2c) 22:51:29 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x31579f5315da7a7) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x9, &(0x7f0000000140)=0x4) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x200000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, &(0x7f0000000000)={0x1, 0x0, {0x5, 0x100, 0x2005, 0x2, 0xb, 0x4, 0x0, 0x3}}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x3, 0x248841) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r2, &(0x7f00000001c0)="7bc6d11cac01bca15dedfb455756c8803d1cceed489a414faaa3047bfa383de957026acbdbc4d41d69c7a2b2c7d14c04600a348a630aa1f3b4fc98c706023df55ad34ac0d1af9ce677a3699cd6224d8d8995ff211e483c3d4b76bbad64023c6bcf822680ebdc1cbf54e3b4723e3d05d01a88527d6eb0f0492e1f047ff5e19cee0bdf18d54108825e69fba133c965e89aee06910e2ec2ca0fac721d2bbf9b251a56d9cd49af75e069", &(0x7f0000000280)=""/41}, 0x18) 22:51:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x87b}, 0x28) 22:51:29 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x1d, &(0x7f0000000080), 0xfcf3) 22:51:29 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x8000000000000, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/pid\x00') r2 = syz_open_procfs(r0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x17, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x87c}, 0x28) 22:51:30 executing program 4: memfd_create(&(0x7f0000000000)='keyringposix_acl_access-\x00', 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) add_key(&(0x7f0000000200)='id_legacy\x00', 0x0, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r1) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='keyringposix_acl_access-\x00', r2) 22:51:30 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x1e, &(0x7f0000000080), 0xfcf3) 22:51:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x100000000000000, 0x4000}, 0x2c) 22:51:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x18, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:30 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="747289642e6e65742f726f7574656000000000"], &(0x7f0000000040)='net/route\x00', 0xa, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) write$UHID_DESTROY(r4, &(0x7f0000000000), 0x4) 22:51:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x87d}, 0x28) 22:51:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x3fd, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x87e}, 0x28) 22:51:30 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80, 0x0) fcntl$getflags(r2, 0x40a) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) write$P9_ROPEN(r5, &(0x7f0000000080)={0x18, 0x71, 0x2, {{0x40, 0x1, 0x1}, 0x20}}, 0x18) 22:51:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x24, 0x0, 0x100000000000000, "f05ba0d855e6f7d30da21a7d450fef82", "cf6251bbfd6b86cc1364c7d6c2febd"}, 0x24, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c562c067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) signalfd4(r4, &(0x7f0000000000)={0x3ff}, 0x8, 0x80800) 22:51:30 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000080), 0xfcf3) 22:51:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x200000000000000, 0x4000}, 0x2c) 22:51:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0xffffff85, 0xffe4, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x87f}, 0x28) 22:51:30 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="3c00000003000000000000000000000005000000000000001b00000000000000776c616e307573657275736572757365722a3a700900036c6f5b2a0049632b8d6e7ffc6339d648f65ad545d37fa34d027db93b7e8af29d663b2c5b211dab5372def7d099b700"], 0x3c) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:30 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000080), 0xfcf3) 22:51:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) ptrace$cont(0x3f, r0, 0x40, 0x1d) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x600000000000000, 0x4000}, 0x2c) 22:51:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x2, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x880}, 0x28) 22:51:30 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000080), 0xfcf3) 22:51:30 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000180)=0x80000001) io_uring_setup(0x6a7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x2c3}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x4, 0x4) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') mount(&(0x7f00000001c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='ext2\x00', 0x400, &(0x7f0000000280)='(\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x2, {0x2, 0x1, 0x6}}, 0x14) 22:51:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x3, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x881}, 0x28) 22:51:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x3f00000000000000, 0x4000}, 0x2c) 22:51:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = getuid() keyctl$get_persistent(0x16, r1, 0xfffffffffffffff9) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:31 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x2a, &(0x7f0000000080), 0xfcf3) 22:51:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{}, {0x1, 0x4}]}, 0x14, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x4, {0xa, 0x4e20, 0x7fffffff, @mcast1, 0x2}, r1}}, 0x38) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x4, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x882}, 0x28) 22:51:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x4000000000000000, 0x4000}, 0x2c) 22:51:31 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}, 0x1, 0x0, 0x0, 0x84}, 0x0) preadv(r1, &(0x7f0000000480), 0x4a4d20fa35a723e, 0x6c00000000000000) 22:51:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/route\x00') ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) keyctl$session_to_parent(0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x100000, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080)=r5, 0x4) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x80000001, 0x2b02) rt_sigreturn() setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:31 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x2b, &(0x7f0000000080), 0xfcf3) 22:51:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x883}, 0x28) 22:51:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x5, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x8000000000000000, 0x4000}, 0x2c) 22:51:31 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ead, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x884}, 0x28) 22:51:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x6, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:31 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x2c, &(0x7f0000000080), 0xfcf3) 22:51:31 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000100)={'security\x00', 0x1000, "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"}, &(0x7f0000000000)=0x1024) 22:51:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x7, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0xdf00000000000000, 0x4000}, 0x2c) 22:51:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x885}, 0x28) 22:51:32 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x2d, &(0x7f0000000080), 0xfcf3) 22:51:32 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000000)) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xa, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x886}, 0x28) 22:51:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='westwood\x00', 0x9) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fsync(r4) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0xffffffff00000000, 0x4000}, 0x2c) 22:51:32 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x2e, &(0x7f0000000080), 0xfcf3) 22:51:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x10, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:32 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_mr_vif\x00') ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000080)) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x7, {0x5}}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x14}, @dev={0xfe, 0x80, [], 0x13}, @empty, 0x5, 0x5, 0xc3fd, 0x100, 0x4, 0x200000, r2}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) dup(r3) 22:51:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x887}, 0x28) 22:51:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x48, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x888}, 0x28) 22:51:32 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7f, 0xc59e099f980506e8, 0x0, 0x0, 0x0, 0x7b0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d21e4d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='neu\xdc\x02\x00\x00\x00\x00\x00w\xf8\xa1\x18H\x98p\x8f\xd5(\xdao\xcd\xc6\xef\"H\xef\"') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:32 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x2f, &(0x7f0000000080), 0xfcf3) 22:51:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x1ff, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x104}, 0x2c) 22:51:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x4c, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x889}, 0x28) 22:51:33 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd37f8fab70d0e81, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0x8, 0x4) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xc000000000000003, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x60, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:33 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000080), 0xfcf3) 22:51:33 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x4) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r1, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r2}, 0x33) sendmsg$inet(r0, &(0x7f00000005c0)={&(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000040)="fd4cd46892e657ef0aacc214ec2a6a7801afeec858ba68c056109f2f6c3d9b8a62e6db195881d3cdd298d219bc", 0x2d}, {&(0x7f0000000080)="51ffbb0bce5a2135ba47f89a67466c3c4fa95c32c9fbdf2304a4b5effa61231aa1f1b6e1293d5437406fe59aea99fd70d771136b79214308fd611443b67e4bb1910916fe22fdb2c814db4c073d43189867f24de8cc14afc6247cd5484c956e4aca3b07742766921c789c2300343e5fd82b2572a9561a6e4be062147607bb425410b87759982e1bc2ece95885f0f0bc6e3d802801551f81b824e33ac8fc1dc2fa2a4d7f47e6bc", 0xa6}, {&(0x7f0000000140)="8c82cc3a0126f7ca72b2bc76749da80b652d905418a36984be482b86cb980ffe44a5ac8cc121e00ff0bd76a8f05d0232ad045ea3288fbb412dd7357a36ec3fd7b750351087c4f3624bb4a1c620821fd750ad264c6ebc726fa4c749b1f2adcdcef191aa9785687b8442c490dc4fd8c7c03cd1cff5072b67c83ef728afafebec8896752c44e52c9a923d1f46a48157b38989554e", 0x93}, {&(0x7f0000000200)="acee84cf", 0x4}, {&(0x7f0000000240)="9a938a4a7f5e0146dd34495668c0b0c09c1cb1bc9b5c1e7b4fd8f3671aae6f1b72a5d7095709784b0e07590e4e05d5265d5273f5b7c978b99657930bba7b01e6838b1fc98b6ed39da75084f3f1a0302be5f8014592ffea5610caf6fba0b94684495979f8eb7ba2b9ecfe4831", 0x6c}, {&(0x7f00000002c0)="3994b789ca9ca14d6d454af981b47a17e1a6d598128d6baa423db6bbc98ebaba2ec6f91675af5393c5bd1c", 0x2b}, {&(0x7f0000000300)="2d9f7f75ba9f21158c80842b80246ff00d9b7f1ff8140573581403b2a0fc00412af84a9b50b878b9e43613d88505627b67e81c3d1c63bbb0982cf0e0ed9ff794cd4c629e506eef2d5373d83429b49ca7890f079f", 0x54}, {&(0x7f0000000380)="aa6157af5e2e4a800678010c42aec428b8c18bd71d6793ca9d2758053a6d2b5d633b72c7ed2f330461361ad1f55764a95702a28bb89f814f99e3aa4f3f774a8cf9526b9b65b0f90ff07843", 0x4b}], 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="11000000000000009225781aaf59bee66cf35c0df0b1350d00000000010000000000000000000800110000000000000000000000010000000900000000000000", @ANYRES32=r2, @ANYBLOB="ffffffff7f00000100000000b800000000000000000000000700000094060000cd5c070f00ac1e0001ac1e0001ac1414bb862400000003040f6dd59222b6a4d72b9d307b70170002070b0a64ac1d22654d7a760702940600000009890b06ac1414aaac141421865900000003050a1e39127506d1f0570003530108c9a189c43a9d0510b7cd4b0a99882f4520b6a7540fd7060ba760d98477fdb156fb010ab252de0c270a7241000acaf195cc971d7916010f7632b74f5a71635a5cca4077ba0000044e861100000000000000000000000100000001000000000000001100000000000000000000000100"/244], 0x138}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmmsg(r4, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r6 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r7, 0x0, 0x0) ioctl$SIOCAX25DELUID(r4, 0x89e2, &(0x7f0000000600)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r7}) socket$inet_tcp(0x2, 0x1, 0x0) 22:51:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x88a}, 0x28) 22:51:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x68, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4010000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x13a4, 0x70bd25, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x69ff7cab335c6d21}, 0x4000) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r2, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x88b}, 0x28) 22:51:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x300}, 0x2c) 22:51:34 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x31, &(0x7f0000000080), 0xfcf3) 22:51:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x6c, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) add_key(&(0x7f0000000200)='id_legacy\x00', 0x0, 0x0, 0x0, r0) keyctl$set_timeout(0xf, r0, 0x5575) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='mime_type]Ruser\x00', r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={r1, 0xb1, 0x86}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'sha512-generic\x00'}}, &(0x7f0000000300)="02603224c9f67a2090c748a691b7fc6c222ad12b64f81dd042a547a5a2c710548358ac3f3ecda3ff90b67cb1513fb6e47d016c4424e8eee64c5d82158edd39afef400de8a77817061aad0305bcc5efe5df53f4b1d42b867e534bc7b9a60f3d59ac59b91647bfe47eeae78f428c4d6692ff4ca77a54ba86b02b7a01737a054eebb3f009def5912ec349226dfb168b0adde137354ba559f1bddf702256cbfc3c2f6e7e0490a7a3867295568c3dece4223178", &(0x7f00000003c0)=""/134) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) socket(0x63b96c3201b04fec, 0x5, 0x4) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000600)) ioctl$PPPIOCGL2TPSTATS(r4, 0x80487436, &(0x7f0000000640)="ce6645699ee24b85d4c4820fbbab00f483010627ef308122a90dd7253a5bb447d3c73932929126b88790dcd75eac2fa6d551ef1026248ef4f6caf4db9b4af0e47f97") r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x20200, 0x0) setsockopt$packet_int(r5, 0x107, 0xe, &(0x7f00000004c0)=0x7f, 0x4) add_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000580)="daa51cba9c905a80b29e5861d61cce3a1b3b1db69d71deed9482", 0x1a, 0xfffffffffffffff9) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000080), 0x301) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000000)={0x5, @remote}) syz_open_dev$dri(&(0x7f00000006c0)='/dev/dri/card#\x00', 0x8, 0x80000) setsockopt$sock_attach_bpf(r3, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x88c}, 0x28) 22:51:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x88d}, 0x28) 22:51:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x74, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:34 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:34 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000080), 0xfcf3) 22:51:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x430}, 0x2c) 22:51:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x88e}, 0x28) 22:51:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x7a, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:34 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x72282, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000200)) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1b82, 0x100000000000000, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x10000}, 0x0, 0xbfffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f00000003c0)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) r5 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r5, 0x29, 0x14, &(0x7f0000000080), 0x301) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmmsg(r7, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) accept$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r9, 0x1, 0x6, @local}, 0x10) setsockopt$sock_attach_bpf(r5, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) setsockopt$bt_hci_HCI_FILTER(r12, 0x0, 0x2, &(0x7f0000000040)={0x268fc3ab, 0x632, 0x7fff, 0x15}, 0x10) 22:51:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x500}, 0x2c) 22:51:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0xb67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xa58640, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'net/route\x00'}], 0xa, "39c71ac39cefabf58d58dddd6d22edac22f150d051980d8d159903d0f5a8015a8b781b07a534d8ee3ad3c1e91738b5a5a5041ffa124128a5552db1e377d257f89466c523"}, 0x5a) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:34 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x33, &(0x7f0000000080), 0xfcf3) 22:51:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x88f}, 0x28) 22:51:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xbd, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:34 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x800, 0x0, 0xb, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0xd27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) r6 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r7, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000100)='f2fs\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1, &(0x7f0000000180)=[{&(0x7f00000002c0)="8a18b5d3b0e6b4f5bfb7e24e1e7463ee4ba3806a55a44a5f8d2aa57a7771992b71f9d8faf30a0307796872d58d3ec188414d1b21a895a37eb0357b514ce51192dffeecbe16d1aa500a74f0e892013d275f4249ee8972038a285782d7e06ad36cf51266980f839a9d61230f883e534b582929161565d74cae6732e51c7239d5a9193d43e204d7ef664ebd807cd8c0a6f3e416d3028d0d4f38e54fe5a142ec5952f57c21799b43e69cd2b51fdc6f44430f3786201c11dbeafbc4635c6d39ea7bbcc7b2505cbc7e4f85c2aa8b57b1ae1a1d885632e260fbbe545841a419143148", 0xdf, 0x6}], 0x20000, &(0x7f00000004c0)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}, {@nodiscard='nodiscard'}, {@fastboot='fastboot'}, {@inline_data='inline_data'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@alloc_mode_def='alloc_mode=default'}, {@grpjquota={'grpjquota', 0x3d, 'net/route\x00'}}], [{@uid_eq={'uid', 0x3d, r5}}, {@euid_eq={'euid', 0x3d, r7}}, {@hash='hash'}]}) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r8, 0x0, 0x50000000000443) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r8, 0xc034564b, &(0x7f0000000080)={0x9, 0x51424752, 0xfff, 0x100000000, 0x3, @stepwise={{0x8000000000, 0x8}, {0x9}, {0x6, 0x400}}}) r9 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r9, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x600}, 0x2c) 22:51:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x890}, 0x28) 22:51:34 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x35, &(0x7f0000000080), 0xfcf3) 22:51:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x21c, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x891}, 0x28) 22:51:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x700}, 0x2c) 22:51:35 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x20000000000007f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb3af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x25a, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:35 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000080), 0xfcf3) 22:51:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x892}, 0x28) 22:51:35 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') open(&(0x7f0000000000)='./file0\x00', 0x400, 0x49) sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x900}, 0x2c) 22:51:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x300, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x893}, 0x28) 22:51:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000020000d080003000000000000000014000000000000000000150001001400010000000000000114000200fe8000"/62], 0x48}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r2, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r3}, 0x33) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000440), &(0x7f0000000480)=0x4) recvmsg(r4, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r5}, 0x33) sendmsg$nl_route(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x11000810}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="b80000004300080027bd7000fedbdf250000000008000300fdffffff080003000010000008000300080000000c00080001010000000000000800030007000000640006000c000500010000000000000008000b00600500000c000c00ad0800000000000008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="0ca80000000000fb630b630d0000057ced00000000000c00040000000000080002000800000004000600"/57], 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x24000000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x3f, 0x20}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r6, @in={{0x2, 0x4e24, @empty}}, 0x7ff, 0x8}, 0x90) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r7, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xa00}, 0x2c) 22:51:36 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x37, &(0x7f0000000080), 0xfcf3) 22:51:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x500, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x894}, 0x28) 22:51:36 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x7b, 0x1, 0x7f, 0xfffffffffffffffb, r3}, &(0x7f0000000040)=0x10) 22:51:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x600, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:36 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x38, &(0x7f0000000080), 0xfcf3) 22:51:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xb00}, 0x2c) 22:51:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x895}, 0x28) 22:51:36 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27d, 0x0, 0x10000000003, 0x0, 0xc5c, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) getpeername$netrom(r0, &(0x7f0000000000)={{0x3, @netrom}, [@bcast, @default, @null, @default, @default, @null, @bcast, @null]}, &(0x7f0000000080)=0x48) 22:51:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x700, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xc00}, 0x2c) 22:51:36 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x896}, 0x28) 22:51:36 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x39, &(0x7f0000000080), 0xfcf3) 22:51:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x640, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xa00, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x897}, 0x28) 22:51:36 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000080)={r1, 0xf63ddc0630e12e02}) 22:51:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x1c02, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xd00}, 0x2c) 22:51:37 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$VIDIOC_S_DV_TIMINGS(r3, 0xc0845657, &(0x7f0000000000)={0x0, @reserved}) 22:51:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x898}, 0x28) 22:51:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000000)=""/17) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000040)={0x267, 0xfffffffffffffffe, 0x5, 0x6, 0x6, 0x69b}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$kcm(0xa, 0x2, 0x11) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x1, 0x11, 0x9, 0x100000001, 0x7, 0x1000, 0x1}}) setsockopt$sock_attach_bpf(r5, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r5, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:37 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x3a, &(0x7f0000000080), 0xfcf3) 22:51:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x2000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xe00}, 0x2c) 22:51:37 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000000)={{0x0, @loopback, 0x4e20, 0x2, 'lblc\x00', 0x30, 0xffff, 0x5c}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x2, 0xffff, 0xff, 0x3}}, 0x44) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x899}, 0x28) 22:51:37 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, &(0x7f0000000080), 0xfcf3) 22:51:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xf00}, 0x2c) 22:51:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x3f00, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x89a}, 0x28) 22:51:37 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = socket$netlink(0x10, 0x3, 0xa) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x1100}, 0x2c) 22:51:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)=0xfffffffffffffffc) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x4000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:38 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x3c, &(0x7f0000000080), 0xfcf3) 22:51:38 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmmsg(r4, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x100}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r6, 0xfffffffffffffff7, 0x453, 0x80000001}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r7, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x89b}, 0x28) 22:51:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x1200}, 0x2c) 22:51:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x1300}, 0x2c) 22:51:38 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x3e, &(0x7f0000000080), 0xfcf3) 22:51:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x4800, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x89c}, 0x28) 22:51:38 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1064, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001020008000b000200000008000e004e2400000800060004000000080002004e22000014000200080103000400000008000b000a000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0xc040) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000000)) 22:51:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xe8) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000980)={r9, 0x1, 0x6, @random="f1ec1157b9cd"}, 0x10) r10 = accept4(r2, 0x0, 0x0, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r12, 0x0, 0x50000000000443) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r12, 0x84, 0x21, &(0x7f0000000100)=0x32f, 0x4) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, 0x0) fcntl$setown(r14, 0x8, r15) sendfile(r10, r13, 0x0, 0x50000000000443) ioctl$EVIOCSKEYCODE(r13, 0x40084504, &(0x7f0000000000)=[0x200, 0x8]) 22:51:38 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000020000d0800000000000000000a00140000000000000000001500c754010014000100ff010000000000000000000000005e3ca8f40200fe8000"/72], 0x48}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x0, 0x40, 0x1f, 0xd2a, 0x3f}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x1400}, 0x2c) 22:51:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x89d}, 0x28) 22:51:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x4c00, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:38 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x42, &(0x7f0000000080), 0xfcf3) [ 1623.245163][T29055] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1623.333991][T29055] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 22:51:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x1500}, 0x2c) 22:51:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x5a02, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x89e}, 0x28) 22:51:39 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x43, &(0x7f0000000080), 0xfcf3) 22:51:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x6000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x1600}, 0x2c) 22:51:39 executing program 4: accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x800) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={r0, @loopback, @loopback}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x20000, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000022ef42fd4d92f0e9f4632f5c5cb5aff24710db580c7d", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r4 = socket$alg(0x26, 0x5, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmmsg(r5, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in6={0xa, 0x4e24, 0x4, @rand_addr="7c639d79cde82b04c7bba62edef600", 0x400}, @in={0x2, 0x4e20, @broadcast}], 0x48) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={r3}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, 0x101, 0x10001}, 0x90) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x138) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r7, 0x40101283, &(0x7f0000000040)={0xfffffffffffffe00, 0x6}) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r8, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x2020}, 0x2c) 22:51:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x89f}, 0x28) 22:51:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x6800, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:39 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, &(0x7f0000000080), 0xfcf3) 22:51:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x3f00}, 0x2c) 22:51:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a0}, 0x28) 22:51:39 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x6c00, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:39 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x48, &(0x7f0000000080), 0xfcf3) 22:51:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x28000, 0x0) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f00000002c0)={'bcsf0\x00', 0x1a55, 0x7fffffff}) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f00000000c0)={0xfffffffffffff679, 0x6, 0x3, 'queue0\x00', 0x2}) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r4, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4002}, 0x2c) 22:51:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a1}, 0x28) 22:51:39 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x15000, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x7400, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:40 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x49, &(0x7f0000000080), 0xfcf3) 22:51:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a2}, 0x28) 22:51:40 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x7a00, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:40 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x4a, &(0x7f0000000080), 0xfcf3) 22:51:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a3}, 0x28) 22:51:40 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = socket$alg(0x26, 0x5, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0xffffffffffffff30, 0x7) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000140)={'bpq0\x00', {0x2, 0x4e20, @broadcast}}) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$CAPI_CLR_FLAGS(r4, 0x80044325, &(0x7f0000000000)=0x1) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000020000d0800000000000000000a00140300000000000000001500010014000100ff01000000000000000000000000000114000200fe8000"/72], 0x48}}, 0x0) accept4(r0, 0x0, &(0x7f0000000000), 0x80000) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000040)=0x5, 0x4) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x9fff, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a4}, 0x28) 22:51:40 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x4b, &(0x7f0000000080), 0xfcf3) 22:51:40 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x100000000) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x40000) 22:51:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4006}, 0x2c) 22:51:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xbd00, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a5}, 0x28) 22:51:41 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a6}, 0x28) 22:51:41 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x4c, &(0x7f0000000080), 0xfcf3) 22:51:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xe3ff, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x8, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:41 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) mount(&(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'L+', 0x1}, 0x28, 0x1) utimes(&(0x7f0000000240)='./file0\x00', 0x0) close(0xffffffffffffffff) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[]) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108a555fed80000000097bb9714", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x4c0300, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x1000, 0x9, 0xfffffffffffff001, 0x4, 0x0, 0x9, 0x20, 0x2, 0x5, 0x5, 0x7, 0x1ff, 0x90cc, 0xfff, 0x2, 0x3, 0x1, 0x1ff, 0x1, 0xfffffffffffffff8, 0x81, 0x81, 0x48, 0x80000000, 0xa4, 0x4, 0xdea1, 0xffffffff, 0x3, 0xff, 0xfffffffffffffff7, 0xfffffffffffff367, 0x1, 0x3, 0x4, 0x81, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000180)}, 0x8, 0x378, 0x1, 0x2, 0x5, 0x4, 0x100000000000000}, r1, 0x4, 0xffffffffffffffff, 0x9) open(&(0x7f0000000000)='./file0\x00', 0x48341, 0x8) preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xff00, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a7}, 0x28) 22:51:41 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x4d, &(0x7f0000000080), 0xfcf3) 22:51:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4020}, 0x2c) 22:51:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a8}, 0x28) 22:51:42 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000080), 0xfcf3) 22:51:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x40df}, 0x2c) [ 1626.653956][T30022] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 22:51:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8a9}, 0x28) 22:51:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xff9f, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xbfffff1f}, 0x2c) [ 1626.814785][T30197] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1626.882669][T30022] syz-executor.3 (30022) used greatest stack depth: 21976 bytes left 22:51:42 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0x3) 22:51:42 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) socket$alg(0x26, 0x5, 0x0) 22:51:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8aa}, 0x28) 22:51:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xffe3, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000200)='./file1\x00', 0x449b, 0x6, &(0x7f00000005c0)=[{&(0x7f00000002c0)="9e12d75dbe131db6dc0009a7b2dc1316a18fd5386e8b7ec4ef8d09fd88af38cbc2560acf65fda4c96d3baff3afa1212c6c0393b3e5a876187e6e39d6aa75f71542ff953775f9eb60a97f4dfe2f11a97a3dba6c0282eede68f312c5f38d48ef7dbb5349738ba726e0a66b954e96ee71cd130d864e5c3343997d2833f4dd0644c9a01d194c0be85be54ba050afa7ed27e9685ec51fdec9851591f6eb2094dd951b1e8ea61c97c6edb10eeaa5564d1efd3c776e78576b", 0xb5, 0x2}, {&(0x7f0000000380)="9b7b6223b18116d9435f73aefd0900daf2263cd126384c3e427b734f06fd71e181dfdd1fd8120c38a5ea665943d4b97fe64945aa99fbb53ddedae9a4386a12f99f1c5645dfba73908c48374768bb59fda64c41dc5e7ad0259c4092486f6cf3164f506ef130595bc723b1a655", 0x6c, 0xffffffffffffffc1}, {&(0x7f0000000400)="8616036348c267e99bf04e133ddee3de8329c9af9231efc75ddba50e0bafa68c422245", 0x23, 0x3}, {&(0x7f0000000440)="b691c8bec5a9ea9c46158b6841038d345a9652210f21cf2b8cb5c98c7f8cbb6743b8", 0x22, 0x100000000}, {&(0x7f0000000480)="677f640f8691e34ef1cc4f605129ce96a66583fd6359641ffb1de20262c4832ed26e7feb47148137a52b91db403421fadf77b7c6120cac4844114116316883a656fd0592dabb696ec8bc3a447d2773a4c31e2a6c8e99992c13dbb1271f3f862e9aa566e12c5c7a4f9643e1378919d5ceb6aed0ba02046360adb4f83b9087ff2ce5998446890b3a0c7ba6f63ab16fbaa989f6410fb243e53321587f0dc9dcdadd5fd1dbf301f530cf52fe5aa7546a005de14b325f0159923771ee557a6a58faf63a1f6bce496124a047ec566735b73663bbdaf57c6243e2c3aac27e", 0xdb, 0xffffffff}, {&(0x7f0000000580)="96ffcaa7694e9be15828c5d97af64b0016e49362157719f0", 0x18, 0x322c68f0}], 0x800000, &(0x7f0000000740)={[{@grpquota='grpquota'}, {@sunit={'sunit', 0x3d, 0xf69}}, {@noalign='noalign'}, {@pquota='pquota'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r4}}]}) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="feff0700", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) poll(&(0x7f00000007c0)=[{0xffffffffffffffff, 0x400}, {r3, 0x10c}], 0x2, 0xfff) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000000)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000800)=ANY=[@ANYRES32=r7, @ANYBLOB="ad0000004a80385d13a9bd31d3337aa39da5a4644d58edf55bf4ec5a1010724c9a178a34f1c6a8dc6cb65f2946d4caa8b91017889677f65d884fcef2659889c3674e30454f6f2c628dbfa605d60a8beed20144b326555fe4ba7af970b92409257de12fe450548de548857d16684cdc77119bf02461167f3dde2e6052afd85458463ee7e07c2093f8b63d9dcc886c860edee07ee30c2a4ef8a2dcab3bf5794f9404bb00417adb57e300000000000000000086760af1956e25e9fece500786dca054270721029fd71c2c50a7ae48853b1becf1e1056e5ebdfcbccf7d10e269a793f61b01d880b65959a5be50444f2ae45c42bc74e1d24fa7640a924d3ed159a1b604b2454b9f3cd06ca3935944419e2ea431646e65b86980015fe7f37eee7dcb7733f323af84be222593a38642c8ab1b711fef67e66dbbd7c3aa630509ce1a928a63a0d74c1407db38fe2ff49871f3e720621fce7e4643c88428768ba08b6a2f213293e0c808389f1c3384cccb7241feb109d539be3dc1a5069f262b9adc0b2c24"], &(0x7f0000000000)=0xb5) 22:51:42 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0x13) [ 1627.284881][T30375] XFS (loop4): unknown mount option [appraise_type=imasig]. 22:51:42 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x42, 0x34) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0x100000000, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 22:51:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8ab}, 0x28) 22:51:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x92902, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:42 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'user.', 'bpq0\x00'}, &(0x7f0000000180)=""/101, 0x65) socketpair(0x2, 0x1, 0x8001, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x8, 'syz1\x00', @null, 0x5, 0x0, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}) 22:51:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8ac}, 0x28) 22:51:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xd0004020}, 0x2c) 22:51:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f00000000c0)={r5, 0x48, 0x1, 0x2, 0x81, 0x7}, 0x14) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmmsg(r7, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r7, 0x114, 0xa, &(0x7f0000000100)={0x1, '#'}, 0x2) 22:51:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8ad}, 0x28) 22:51:45 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x8000, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x30, r5, 0x701, 0x0, 0x0, {0x13, 0x0, 0xfffffffffffff000}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb7}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000680}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x10c, r5, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb3c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x71}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x759b}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffff9bc}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcf1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x48}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x20000000}, 0x51) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r2, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) msgget$private(0x0, 0xc4) sendmmsg(r6, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_mreq(r6, 0x0, 0x23, &(0x7f0000000180)={@multicast2, @loopback}, &(0x7f0000000200)=0x8) r8 = accept4(r1, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) sendto$ax25(r9, &(0x7f0000000000)="fbc5c7819567b06ee6ccba562b93c478691112155bb3ddfd893daa09d1fc1d3e48abf112e6c8013ea1f398e2409fa049fb8912255eddaab57057872538ca1bde02c20bef9e9c0a767491a63304486f415ca6cc7bace5466eb7f314e60a3563f7646acfa9fecd9ec5033cefe6abf01c44fbf216e45f745213f104efdb6076c5304d2544429e1b97295cd42e824da5bc", 0x8f, 0x40000, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x98759, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffffffffff8) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={r4, 0xb8d}, &(0x7f0000000040)=0x8) 22:51:45 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8ae}, 0x28) 22:51:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x200000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r1 = syz_open_dev$dmmidi(&(0x7f0000000880)='/dev/dmmidi#\x00', 0xffffffffffffffa0, 0x80000) accept4$llc(r1, &(0x7f00000008c0), &(0x7f0000000900)=0x10, 0x80800) 22:51:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xffffc8ffffffffff}, 0x2c) 22:51:45 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r1, r0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8af}, 0x28) 22:51:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x400000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000003a2207c21e4711cfb834227d10fea9fb2ca1fe337893b3327f76f161bb0ffe0a1490d7dc73ce8b7cbd448888ebdb100e4f1fa632a01415d0244ea7d24f5e628eba5d99ff99ab1b108c468e861ff72eaf901ad13be090a533b81c0162b342aafbf822eb21ef0845e2da3d2b25dca57d80f2dd098488ff6c78396535a3613d9b3a4058d922611913b35f202db9c9dde10995e77e318aa76b89d7e459d28422803cf4036c6ebb798987494183cf7f9f98ab3921bbe35551c60f29f34784a99000000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000000)={r6}, 0x8) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={r6}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={r8}, 0x8) r9 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) connect$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) 22:51:46 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/237, 0xed}, {&(0x7f0000000080)=""/47, 0x2f}, {&(0x7f0000000100)=""/57, 0x39}, {&(0x7f0000000140)}, {&(0x7f00000003c0)=""/115, 0x73}, {&(0x7f0000000180)}, {&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f0000000440)=""/92, 0x5c}, {&(0x7f00000004c0)=""/90, 0x5a}], 0x9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x101, 0x10000) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x10000, 0x40) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b0}, 0x28) 22:51:46 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f00000000c0)=""/196, &(0x7f0000000040)=0xc4) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_AUTH_MAGIC(r4, 0x40046411, &(0x7f0000000000)=0xfffffffffffffffa) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/de^/btrfs\x00\x00\x00\x00\x00\x00\x01\x00\xb9', 0x20000, 0x0) 22:51:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x600000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0x12, 0x800) write(r1, &(0x7f0000000280)="7c1459a79ad4e1fa4f44882940bcbab4a1319a", 0x13) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)="733d4dc0788691b92766e24e7373984de3c382c33577b8c5e302e842f4551caac23970cdccfeeab9c6173a87cd6a810fba0510a44814117aa5ac7aa3b64a7980d3e3e6015182071b9ee1bce45dcae4bc7db89383388b1e6cf27b647f273b44da1d3599f923cfd8c774ce88d3d9a887fedb2f46b82a1ebed96407f45829c7e92ccb4c348579dbca1ef2f11f4873bab605fe45e3900b043877caa64c8a5343c14918d01b5086bd435c37476da13e7390f502f503a709b7e3178d223ae34a81", 0xbe}, {&(0x7f0000000000)="28cb9094e73c5f9c64335834e8c60a326f667b517c7e4046f97b7a9eea233b787092777a7c00eec0ee79", 0x2a}], 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b1}, 0x28) 22:51:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x3, 0x72}, 0x1f5) 22:51:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x800000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:46 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) r2 = socket$kcm(0x2b, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) fspick(r5, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:46 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x800000}, r0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$VIDIOC_S_MODULATOR(r4, 0x40445637, &(0x7f00000001c0)={0x7ff, "3c9e4ed2b4292f778756c9ca8f0d7de9fc3c79ae12d95e220050a46e4d08b6cd", 0x808, 0xa6, 0x8, 0x4, 0x2}) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4400) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000180)={0x4, 0x0, 0x10001, 0xd802}) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f0000000100)={0x3c6b3c8029d54325, 0x0, {0x0, 0x10001, 0x300c, 0x6, 0x5, 0x0, 0x0, 0x5}}) 22:51:46 executing program 5: ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f00000002c0)={'syzkaller0\x00', {0x2, 0x4e24, @multicast1}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+'}, 0x28, 0x4) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000020000d080000010039ba45cd82414e4b00000000000000001500010014000100ff01000000000000000000000000000114000200fe8000000400"/72], 0x48}}, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x10, 0x50, r4, 0x0) sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$TCSETX(r3, 0x5433, &(0x7f0000000000)={0x81, 0x3, [0x800, 0x7fffffff, 0x7, 0x40, 0x70000], 0x2}) r5 = gettid() r6 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x92080) sysfs$1(0x1, &(0x7f0000000200)='^\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r6, 0x40405514, &(0x7f0000000040)={0x9, 0xa1f3fd242d289ea8, 0x467, 0x0, 'syz1\x00', 0x2}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget(0x3, 0x400) r7 = syz_open_dev$cec(0x0, 0x0, 0x2) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_RD_TIME(r6, 0x80247009, &(0x7f0000000180)) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) ioctl$ASHMEM_GET_PIN_STATUS(r7, 0x7709, 0x0) fcntl$setownex(r8, 0xf, &(0x7f0000000140)={0x1, r5}) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x73, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x6) 22:51:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b2}, 0x28) 22:51:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x8001a0, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:46 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_GET_XSAVE(r5, 0x9000aea4, &(0x7f00000002c0)) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r2, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') ioctl$KVM_SMI(r5, 0xaeb7) sendfile(r6, r7, 0x0, 0x50000000000443) sendmmsg(r6, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$llc_int(r6, 0x10c, 0x4, &(0x7f0000000000)=0x2, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x80ffff, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b3}, 0x28) 22:51:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x1000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b4}, 0x28) 22:51:47 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) exit_group(0x7) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$TCSBRK(r4, 0x5409, 0x7) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4471597c2e5663ff, 0x0) write$P9_RREMOVE(r5, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) 22:51:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x2000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b5}, 0x28) 22:51:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x2290900, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b6}, 0x28) 22:51:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x3000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b7}, 0x28) 22:51:48 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x3, 0x43a, [0x0, 0x200002c0, 0x20000446, 0x2000069a], 0x0, &(0x7f0000000100), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{0x3, 0x88, 0xf, 'veth0_to_bond\x00', 'bcsf0\x00', 'caif0\x00', 'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0xff, 0x80, 0x0, 0x61e81bb6398b8a4], @dev={[], 0x21}, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0xae, 0x126, 0x156, [@connbytes={'connbytes\x00', 0x18, {{0x44b, 0x40, 0x2, 0x1}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x8, 0x80000000, 0x9, 0x0, 0x0, "546f221211bfdb84b479dfc6a296656b033435327599ee7b34544b9b4d57a5f05602dc468a50bbc9204cb17caeb97910dc6f419e622db85072273e4bbaafa9d9"}}}], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xffffffffffffff7f}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{0x3, 0x2a, 0x9100, 'dummy0\x00', 'vcan0\x00', 'bridge_slave_1\x00', 'ip6gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x1fe, 0x7f, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0x101, 0x1fe, 0x7f], 0xa6, 0xa6, 0xd6, [@realm={'realm\x00', 0x10, {{0x10001, 0x6, 0x1}}}], [], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}}, {0x0, 0x4, 0xa3a5, 'veth0\x00', 'rose0\x00', 'team_slave_1\x00', 'veth1_to_team\x00', @random="c2ae60914e3f", [0xff, 0xff, 0x0, 0x178b25c5d2d39bb0, 0x101, 0x7f], @remote, [0x0, 0xff5972f928c6d9fa, 0x0, 0xff, 0x0, 0xff], 0xfe, 0xfe, 0x14e, [@pkttype={'pkttype\x00', 0x8, {{0x2}}}, @arp={'arp\x00', 0x38, {{0x1c, 0xcbcc, 0x3, @loopback, 0x8e036df5bd1e75d5, @local, 0xff000000, @link_local, [0xff, 0x1fe, 0x181, 0x0, 0xff, 0x80], @random="97f0625dbe3f", [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0xc0}}}], [], @common=@log={'log\x00', 0x28, {{0x4000, "2a2126436b95f9ef0e95fff1d938108e1ecf6682b963e78bb5a02de7da10", 0x4}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x4b2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) read(r4, &(0x7f0000000200)=""/18, 0x12) r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = getpid() sched_setscheduler(r6, 0x5, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x440000, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000040)=@bridge_dellink={0x0, 0x11, 0x0, 0x70bd2d, 0x25dfdbfb, {0x7, 0x0, 0x0, 0x0, 0x40000, 0x42808}, [@IFLA_LINK_NETNSID={0x0, 0x25, 0x3}, @IFLA_NET_NS_PID={0x0, 0x13, r5}, @IFLA_NET_NS_PID={0x0, 0x13, r6}, @IFLA_IFALIAS={0x0, 0x14, 'gre0\x00'}, @IFLA_IFALIASn, @IFLA_MTU={0x0, 0xe, 0x8}, @IFLA_NET_NS_FD={0x0, 0x1c, r7}, @IFLA_EVENT={0x0, 0x2c, 0x5}]}, 0x103}, 0x1, 0x0, 0x0, 0x8040004}, 0x0) flock(r0, 0x6) 22:51:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x100000000000400, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3e, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:48 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x1}, 0x10, &(0x7f00000011c0)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f0000000040)="87338839c387", 0x6}, {&(0x7f00000010c0)="0e2ee873435c9fc218a9db77d792fc62d963793d3a618c210d2dc98dc4d3677cbd9aafa5bf921b7c5f2743d784d1c0d46a0aaf8228da06a186db333e0d5fbd6298d4d3670c6ec507e183b502930e8aaba14e590714642aec95e5f2e0698e64a34492126bf3fe8cdf5b1c8b894a76476ce4b91879f5e7622cd55193f37cadc9274ff972edfacfb0b7181677c899a6d26bcc88d63c937a74d636d17f1ca77371b854f1bcbacbcf3c41fbcd594210e8af1f38b885c11de8f8685cc0d9fa2a5cac4400d4d375a2b9a44de8f2c7dd75b07c", 0xcf}], 0x3, &(0x7f0000001200)=[@ip_retopts={{0x38, 0x0, 0x7, {[@generic={0x88, 0xf, "c3bb5170ceacec6e87f88a7dbd"}, @rr={0x7, 0x17, 0x7fff, [@rand_addr=0xff, @multicast1, @remote, @remote, @local]}]}}}], 0x38}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001280)='/dev/autofs\x00', 0x800, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x20, r4, 0x201, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000001400)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001300)={0x90, r4, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @remote}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x20010010) 22:51:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x4000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b8}, 0x28) 22:51:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) clock_adjtime(0x3, &(0x7f0000000200)={0x401, 0x2, 0x4, 0xfffffffffffffffe, 0x2, 0x7a, 0x3, 0x5, 0x8001, 0x1, 0x6, 0x2, 0x4, 0x0, 0x9, 0x1, 0x8, 0x1f, 0x5, 0x8, 0x9e4d, 0x5, 0x57c, 0xe, 0x193c, 0xdd7d}) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x5000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8b9}, 0x28) 22:51:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @dev={0xfe, 0x80, [], 0x1c}, @remote, 0xfffffffffffffff8, 0x3, 0x101, 0x100, 0x4389, 0x20800a0}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r3, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r4}, 0x33) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6}, 0x10) r5 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r5, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r5, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x6000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:48 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmmsg(r6, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r8 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r8, 0x84, 0x23, &(0x7f0000000000)={r10}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x9918, 0x80, 0x9, 0x7, 0x3, 0xea, 0x7, {r10, @in={{0x2, 0x4e20, @multicast1}}, 0xffffffff, 0x1, 0x243, 0x1, 0x8}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000040)={r11, 0x5}, 0x8) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8ba}, 0x28) 22:51:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) 22:51:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8bb}, 0x28) 22:51:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x7000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:49 executing program 1: r0 = socket$kcm(0xa, 0x4, 0x11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000200)={0xffffffff}, 0x2) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_XEN_HVM_CONFIG(r6, 0x4038ae7a, &(0x7f00000001c0)={0x80000001, 0x885, &(0x7f0000000000)="76d2587d8528f8b48972a82f7ed3c95245acee8fea292150d4a5e7d783b9339e087539932643f3170e2954f2c72d47edefab69cbcb33103f38116b3e7ed0fd4adbca57f83bada102", &(0x7f00000000c0)="0a264566dc2d73c34025281469ebc1005ea2b663c2d6607f30bf9bd8a07f734c298849d4fe32cc1da4b0cd092b6b1d12b6a6740235e0c00b2d6d4196cb14ca06c49c175cf1f47e18bd591ffc6eea3bcc1f6f83cfc3c0c344a94ec76c3f9ad397a16f4559936b919096c78ca3221334422b4f2dc080ab504b3b5f3b517885d6ec984772bb95752febd661b95d47c2baf3633c21bcc02bee21d56123d323f3c52c79646da1cc0112f376f1baafe4181362c99bc8b2f51ba402134127e8b8b6d3260f21", 0x48, 0xc2}) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r9, 0x800442d3, &(0x7f00000002c0)={0x1, 0x7, 0x2, @dev={[], 0xc}, 'caif0\x00'}) 22:51:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xa000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8bc}, 0x28) 22:51:49 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = getpid() r6 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = getpid() fstat(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() sendmsg$unix(r7, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6], 0xb0, 0x40010}, 0x8000) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = accept4$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x9f631ea35eb6af87, @reserved}, 0x10, 0x80800) r13 = getpid() sched_setscheduler(r13, 0x5, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r15 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r15, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r16 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r17 = getpid() fstat(r15, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getgid() sendmsg$unix(r16, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15], 0xb0, 0x40010}, 0x8000) r20 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r20, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r21 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) r22 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r22, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r23, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r24, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r25, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r26 = syz_open_pts(0xffffffffffffffff, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r27, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fcntl$getownex(r27, 0x10, &(0x7f0000000380)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r30 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r30, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r31 = socket$alg(0x26, 0x5, 0x0) bind$alg(r31, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r32 = accept4(r31, 0x0, 0x0, 0x0) r33 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r32, r33, 0x0, 0x50000000000443) r34 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f0000001840)='{procself\x00', r33}, 0x10) r35 = syz_open_dev$dspn(&(0x7f00000018c0)='/dev/dsp#\x00', 0x0, 0x80) r36 = getpid() sched_setscheduler(r36, 0x5, 0x0) r37 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r38, 0x0, 0x0) r39 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r39, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r39, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = getpid() sched_setscheduler(r41, 0x5, 0x0) r42 = geteuid() r43 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r43, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r43, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r45 = getpid() sched_setscheduler(r45, 0x5, 0x0) r46 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r46, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r46, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r48 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r48, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r49 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r50 = getpid() fstat(r48, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r52 = getgid() sendmsg$unix(r49, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r50, @ANYRES32=r51, @ANYRES32=r52, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48], 0xb0, 0x40010}, 0x8000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c00)=0x0) fstat(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, &(0x7f0000001d00)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002100)={0x0, r0, 0x0, 0xa, &(0x7f00000020c0)='net/route\x00', 0xffffffffffffffff}, 0x30) r58 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r58, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r59, 0x0, 0x0) r60 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r60, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r61 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r62 = getpid() fstat(r60, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r64 = getgid() sendmsg$unix(r61, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r62, @ANYRES32=r63, @ANYRES32=r64, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60], 0xb0, 0x40010}, 0x8000) r65 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000002140)='/dev/btrfs-control\x00', 0x200, 0x0) r66 = socket$alg(0x26, 0x5, 0x0) bind$alg(r66, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r67 = accept4(r66, 0x0, 0x0, 0x0) r68 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r67, r68, 0x0, 0x50000000000443) sendmmsg(r67, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmsg$kcm(r67, &(0x7f0000002180)={&(0x7f0000005200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000056c0)=[{&(0x7f0000005280)=""/133, 0x85}, {&(0x7f0000005340)=""/110, 0x6e}, {&(0x7f00000053c0)=""/195, 0xc3}, {&(0x7f00000054c0)=""/145, 0x91}, {&(0x7f0000005580)=""/170, 0xaa}, {&(0x7f0000005640)=""/98, 0x62}], 0x6, &(0x7f0000005740)=""/208, 0xd0}, 0x100) r70 = syz_open_dev$video(&(0x7f0000005840)='/dev/video#\x00', 0x0, 0x40000) r71 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r71, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r72 = socket$nl_route(0x10, 0x3, 0x0) r73 = getpid() sched_setscheduler(r73, 0x5, 0x0) r74 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r74, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r74, &(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, 0x0}) r76 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r76, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r77 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r78 = getpid() fstat(r76, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r80 = getgid() sendmsg$unix(r77, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r78, @ANYRES32=r79, @ANYRES32=r80, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76], 0xb0, 0x40010}, 0x8000) r81 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r81, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r82 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r83 = getpid() fstat(r81, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r85 = getgid() sendmsg$unix(r82, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r83, @ANYRES32=r84, @ANYRES32=r85, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81], 0xb0, 0x40010}, 0x8000) getgroups(0x7, &(0x7f0000005900)=[0xffffffffffffffff, r80, r85, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) r87 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r87, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r88 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r88, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r89 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r89, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r90 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000005d00)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005d40)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005e40)=0xe8) r92 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r92, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r93 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r94 = getpid() fstat(r92, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r96 = getgid() sendmsg$unix(r93, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r94, @ANYRES32=r95, @ANYRES32=r96, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92], 0xb0, 0x40010}, 0x8000) r97 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006100)={&(0x7f0000005e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x6, [@datasec={0x9, 0xa, 0x0, 0xf, 0x2, [{0x5, 0x0, 0x9}, {0x3, 0x5, 0x8000}, {0x3, 0x9, 0x2}, {0x5, 0x5, 0x80000000}, {0x5, 0x0, 0x7}, {0x5, 0x3, 0x7fffffff}, {0x5, 0x9, 0x9}, {0x4, 0x9, 0x7}, {0x1, 0x5, 0x1}, {0x1, 0x9, 0x1aa}], "d99a"}, @union={0xf, 0x6, 0x0, 0x5, 0xffff, 0x1000, [{0x5, 0x5, 0x1}, {0xf, 0x0, 0x4}, {0x5, 0x1, 0xfffffffffffff001}, {0xd, 0x3, 0x8}, {0x1, 0x1, 0x2}, {0xb, 0x5, 0x8}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2}, @datasec={0x6, 0x4, 0x0, 0xf, 0x2, [{0x1, 0x1f, 0x7}, {0x5, 0x1, 0x680}, {0x4, 0x8, 0x10000}, {0x1, 0xe92c, 0x269}], '0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x10000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @dev={0xfe, 0x80, [], 0x1c}, @remote, 0xfffffffffffffff8, 0x3, 0x101, 0x100, 0x4389, 0x20800a0}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r3, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r4}, 0x33) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6}, 0x10) r5 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r5, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r5, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8bd}, 0x28) 22:51:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KDADDIO(r3, 0x4b34, 0x2) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r4, 0x0, 0x50000000000443) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000100)=""/229) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) 22:51:49 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000000)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000000)={r7, 0x1ff, 0x8, 0x864, 0x40, 0x7}, &(0x7f0000000040)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x1c020000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8be}, 0x28) 22:51:49 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r3, &(0x7f00000097c0)={&(0x7f00000093c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000009440)=""/128, 0x80}], 0x1, &(0x7f0000009740)=""/84, 0x54}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000009800)={0x1, 0x4, 0xcb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, [], r4}, 0x33) bind(r2, &(0x7f0000000000)=@ll={0x11, 0xa3591ed9cd124cab, r4, 0x1, 0x7ff, 0x6, @dev={[], 0xd}}, 0x80) 22:51:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x20000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8bf}, 0x28) 22:51:50 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x229, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x3f000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:50 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000100)) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c000000020000d0800000000000000000a8014fc000000000064dd86379f8d36447ef3f8eb000000001500010014000100fe8000000000000000000000000000271400020000000000000000000000000000dbf7f0f50000001400020022187fd2bfadd5bfbc35929db0c9bdc9140002000000000000000000000000000000002b14000200ff010000000000000000000000000001000100ff0100000000000000000000000000011400020000000000000000000000ffff000000021400020000000000000000000000ffffe0000002"], 0xc0}, 0x1, 0x0, 0x0, 0x14}, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000080), 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) socketpair(0x10, 0x2, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000180)=0x1e) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$RTC_PIE_ON(r7, 0x7005) [ 1634.727364][T31783] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:50 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = getpid() r6 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r6, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = getpid() fstat(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() sendmsg$unix(r7, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6], 0xb0, 0x40010}, 0x8000) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = accept4$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x9f631ea35eb6af87, @reserved}, 0x10, 0x80800) r13 = getpid() sched_setscheduler(r13, 0x5, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r15 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r15, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r16 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r17 = getpid() fstat(r15, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getgid() sendmsg$unix(r16, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15], 0xb0, 0x40010}, 0x8000) r20 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r20, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r21 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) r22 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r22, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r23, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r24, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r25, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r26 = syz_open_pts(0xffffffffffffffff, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r27, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fcntl$getownex(r27, 0x10, &(0x7f0000000380)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r30 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r30, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r31 = socket$alg(0x26, 0x5, 0x0) bind$alg(r31, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r32 = accept4(r31, 0x0, 0x0, 0x0) r33 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r32, r33, 0x0, 0x50000000000443) r34 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f0000001840)='{procself\x00', r33}, 0x10) r35 = syz_open_dev$dspn(&(0x7f00000018c0)='/dev/dsp#\x00', 0x0, 0x80) r36 = getpid() sched_setscheduler(r36, 0x5, 0x0) r37 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r38, 0x0, 0x0) r39 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r39, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r39, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = getpid() sched_setscheduler(r41, 0x5, 0x0) r42 = geteuid() r43 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r43, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r43, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r45 = getpid() sched_setscheduler(r45, 0x5, 0x0) r46 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r46, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r46, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r48 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r48, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r49 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r50 = getpid() fstat(r48, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r52 = getgid() sendmsg$unix(r49, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r50, @ANYRES32=r51, @ANYRES32=r52, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48], 0xb0, 0x40010}, 0x8000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c00)=0x0) fstat(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, &(0x7f0000001d00)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002100)={0x0, r0, 0x0, 0xa, &(0x7f00000020c0)='net/route\x00', 0xffffffffffffffff}, 0x30) r58 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r58, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r59, 0x0, 0x0) r60 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r60, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r61 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r62 = getpid() fstat(r60, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r64 = getgid() sendmsg$unix(r61, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r62, @ANYRES32=r63, @ANYRES32=r64, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60], 0xb0, 0x40010}, 0x8000) r65 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000002140)='/dev/btrfs-control\x00', 0x200, 0x0) r66 = socket$alg(0x26, 0x5, 0x0) bind$alg(r66, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r67 = accept4(r66, 0x0, 0x0, 0x0) r68 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r67, r68, 0x0, 0x50000000000443) sendmmsg(r67, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmsg$kcm(r67, &(0x7f0000002180)={&(0x7f0000005200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000056c0)=[{&(0x7f0000005280)=""/133, 0x85}, {&(0x7f0000005340)=""/110, 0x6e}, {&(0x7f00000053c0)=""/195, 0xc3}, {&(0x7f00000054c0)=""/145, 0x91}, {&(0x7f0000005580)=""/170, 0xaa}, {&(0x7f0000005640)=""/98, 0x62}], 0x6, &(0x7f0000005740)=""/208, 0xd0}, 0x100) r70 = syz_open_dev$video(&(0x7f0000005840)='/dev/video#\x00', 0x0, 0x40000) r71 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r71, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r72 = socket$nl_route(0x10, 0x3, 0x0) r73 = getpid() sched_setscheduler(r73, 0x5, 0x0) r74 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r74, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r74, &(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, 0x0}) r76 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r76, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r77 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r78 = getpid() fstat(r76, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r80 = getgid() sendmsg$unix(r77, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r78, @ANYRES32=r79, @ANYRES32=r80, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76], 0xb0, 0x40010}, 0x8000) r81 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r81, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r82 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r83 = getpid() fstat(r81, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r85 = getgid() sendmsg$unix(r82, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r83, @ANYRES32=r84, @ANYRES32=r85, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81], 0xb0, 0x40010}, 0x8000) getgroups(0x7, &(0x7f0000005900)=[0xffffffffffffffff, r80, r85, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) r87 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r87, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r88 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r88, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r89 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r89, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r90 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000005d00)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005d40)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005e40)=0xe8) r92 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r92, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r93 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r94 = getpid() fstat(r92, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r96 = getgid() sendmsg$unix(r93, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r94, @ANYRES32=r95, @ANYRES32=r96, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92], 0xb0, 0x40010}, 0x8000) r97 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006100)={&(0x7f0000005e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x6, [@datasec={0x9, 0xa, 0x0, 0xf, 0x2, [{0x5, 0x0, 0x9}, {0x3, 0x5, 0x8000}, {0x3, 0x9, 0x2}, {0x5, 0x5, 0x80000000}, {0x5, 0x0, 0x7}, {0x5, 0x3, 0x7fffffff}, {0x5, 0x9, 0x9}, {0x4, 0x9, 0x7}, {0x1, 0x5, 0x1}, {0x1, 0x9, 0x1aa}], "d99a"}, @union={0xf, 0x6, 0x0, 0x5, 0xffff, 0x1000, [{0x5, 0x5, 0x1}, {0xf, 0x0, 0x4}, {0x5, 0x1, 0xfffffffffffff001}, {0xd, 0x3, 0x8}, {0x1, 0x1, 0x2}, {0xb, 0x5, 0x8}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2}, @datasec={0x6, 0x4, 0x0, 0xf, 0x2, [{0x1, 0x1f, 0x7}, {0x5, 0x1, 0x680}, {0x4, 0x8, 0x10000}, {0x1, 0xe92c, 0x269}], '0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000000)={r6}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={r6, 0x1, 0x20}, 0xc) 22:51:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8c0}, 0x28) 22:51:50 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0xb9, 0x0, 0x1, 0x0, 0x0, 0x10002017}, 0x40008) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x149) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x40000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:50 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x3c1) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000040)=r7, 0xfffffeb9) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="ffec3ac9bddb8c09e84f85c81d77ace48800f240f6a28bb828114ae858df362d3d9006b2a7cea1672aabedcfd8a8e28a6a2203618418181f1f50acba73ce9d1ea3c22986bdde2897d9c79848582924caa13b", 0x52}], 0x1, &(0x7f0000000140)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @timestamping={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x9c91}}], 0x60}, 0x0) 22:51:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x48000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8c1}, 0x28) 22:51:50 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7a, 0x40000) sendmsg$nl_netfilter(r0, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x8000, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000280)={0x1, 0xfffffffffffffff9, 0x1000, 0xc7, &(0x7f0000000100)="b89940a901422c172d3fdd50e5d9c15e44764abe1ed50cb07583edc765edef16f6a968cc568a0b8003985b9d39200a953d0e6d915f4fe00fecc692ed227fa9b406f45d281c0ebbfe558211ea96ad5038e27fc80a7c0c8162c177086207b248808b76e3857079bf1321ae1737800ba23d79dd20382c239216aa9e4320a8fedb8e72c07af4f1959bc5d8d40ed3e44aeece17eddb60ce99dac73c9bfe913fc56c33751f105dfffb117f722939808a283843d93c991066064e27560bb71357cec8b135eb5062c20371", 0x64, 0x0, &(0x7f0000000200)="f0eb28b66c36317e7e6aff4c9f397b37335520c7fc61119c42c94b1fb51cc743e052b0325c742d93ef761259e5ea21637f80178cc9e97e2e1fb4eed2fbb7ce638023d88f5c97e930ed2669882d31126ba4c031578a7f0fea135dd3d9f78d7de85e423fd4"}) sync_file_range(r3, 0x6, 0xe6, 0x3) 22:51:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8c2}, 0x28) 22:51:50 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)={0x200000, 0x0, 0x0, 0x40}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0xfff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x4c000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8c3}, 0x28) 22:51:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000000)=0x2, &(0x7f0000000040)=0x2) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:51 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000000)={0x1, 0xbb, 0x54, 0x5}, 0x8) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x59870900, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:51 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = getpid() r6 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r6, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = getpid() fstat(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() sendmsg$unix(r7, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6], 0xb0, 0x40010}, 0x8000) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = accept4$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x9f631ea35eb6af87, @reserved}, 0x10, 0x80800) r13 = getpid() sched_setscheduler(r13, 0x5, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r15 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r15, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r16 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r17 = getpid() fstat(r15, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getgid() sendmsg$unix(r16, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15], 0xb0, 0x40010}, 0x8000) r20 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r20, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r21 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) r22 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r22, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r23, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r24, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r25, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r26 = syz_open_pts(0xffffffffffffffff, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r27, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fcntl$getownex(r27, 0x10, &(0x7f0000000380)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r30 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r30, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r31 = socket$alg(0x26, 0x5, 0x0) bind$alg(r31, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r32 = accept4(r31, 0x0, 0x0, 0x0) r33 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r32, r33, 0x0, 0x50000000000443) r34 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f0000001840)='{procself\x00', r33}, 0x10) r35 = syz_open_dev$dspn(&(0x7f00000018c0)='/dev/dsp#\x00', 0x0, 0x80) r36 = getpid() sched_setscheduler(r36, 0x5, 0x0) r37 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r38, 0x0, 0x0) r39 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r39, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r39, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = getpid() sched_setscheduler(r41, 0x5, 0x0) r42 = geteuid() r43 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r43, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r43, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r45 = getpid() sched_setscheduler(r45, 0x5, 0x0) r46 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r46, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r46, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r48 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r48, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r49 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r50 = getpid() fstat(r48, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r52 = getgid() sendmsg$unix(r49, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r50, @ANYRES32=r51, @ANYRES32=r52, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48], 0xb0, 0x40010}, 0x8000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c00)=0x0) fstat(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, &(0x7f0000001d00)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002100)={0x0, r0, 0x0, 0xa, &(0x7f00000020c0)='net/route\x00', 0xffffffffffffffff}, 0x30) r58 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r58, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r59, 0x0, 0x0) r60 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r60, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r61 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r62 = getpid() fstat(r60, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r64 = getgid() sendmsg$unix(r61, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r62, @ANYRES32=r63, @ANYRES32=r64, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60], 0xb0, 0x40010}, 0x8000) r65 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000002140)='/dev/btrfs-control\x00', 0x200, 0x0) r66 = socket$alg(0x26, 0x5, 0x0) bind$alg(r66, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r67 = accept4(r66, 0x0, 0x0, 0x0) r68 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r67, r68, 0x0, 0x50000000000443) sendmmsg(r67, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmsg$kcm(r67, &(0x7f0000002180)={&(0x7f0000005200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000056c0)=[{&(0x7f0000005280)=""/133, 0x85}, {&(0x7f0000005340)=""/110, 0x6e}, {&(0x7f00000053c0)=""/195, 0xc3}, {&(0x7f00000054c0)=""/145, 0x91}, {&(0x7f0000005580)=""/170, 0xaa}, {&(0x7f0000005640)=""/98, 0x62}], 0x6, &(0x7f0000005740)=""/208, 0xd0}, 0x100) r70 = syz_open_dev$video(&(0x7f0000005840)='/dev/video#\x00', 0x0, 0x40000) r71 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r71, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r72 = socket$nl_route(0x10, 0x3, 0x0) r73 = getpid() sched_setscheduler(r73, 0x5, 0x0) r74 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r74, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r74, &(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, 0x0}) r76 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r76, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r77 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r78 = getpid() fstat(r76, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r80 = getgid() sendmsg$unix(r77, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r78, @ANYRES32=r79, @ANYRES32=r80, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76], 0xb0, 0x40010}, 0x8000) r81 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r81, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r82 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r83 = getpid() fstat(r81, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r85 = getgid() sendmsg$unix(r82, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r83, @ANYRES32=r84, @ANYRES32=r85, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81], 0xb0, 0x40010}, 0x8000) getgroups(0x7, &(0x7f0000005900)=[0xffffffffffffffff, r80, r85, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) r87 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r87, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r88 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r88, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r89 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r89, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r90 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000005d00)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005d40)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005e40)=0xe8) r92 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r92, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r93 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r94 = getpid() fstat(r92, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r96 = getgid() sendmsg$unix(r93, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r94, @ANYRES32=r95, @ANYRES32=r96, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92], 0xb0, 0x40010}, 0x8000) r97 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006100)={&(0x7f0000005e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x6, [@datasec={0x9, 0xa, 0x0, 0xf, 0x2, [{0x5, 0x0, 0x9}, {0x3, 0x5, 0x8000}, {0x3, 0x9, 0x2}, {0x5, 0x5, 0x80000000}, {0x5, 0x0, 0x7}, {0x5, 0x3, 0x7fffffff}, {0x5, 0x9, 0x9}, {0x4, 0x9, 0x7}, {0x1, 0x5, 0x1}, {0x1, 0x9, 0x1aa}], "d99a"}, @union={0xf, 0x6, 0x0, 0x5, 0xffff, 0x1000, [{0x5, 0x5, 0x1}, {0xf, 0x0, 0x4}, {0x5, 0x1, 0xfffffffffffff001}, {0xd, 0x3, 0x8}, {0x1, 0x1, 0x2}, {0xb, 0x5, 0x8}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2}, @datasec={0x6, 0x4, 0x0, 0xf, 0x2, [{0x1, 0x1f, 0x7}, {0x5, 0x1, 0x680}, {0x4, 0x8, 0x10000}, {0x1, 0xe92c, 0x269}], '0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x5a020000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) setsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f0000000000)=0x7fff, 0x4) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000}, 0x200010e1) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x4, 0x3, 0x7, 0xa08e, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800000000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x7}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xe, r3, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000040)={0x5, 0x4}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r5 = syz_open_procfs(r4, &(0x7f00000002c0)='net\xe4 R\xa3cac\xebt\x1a\x0f\xec\xd0[\xb8he\x00r\xe5\xc8#\xder7\xd9\x997\xd7\xfb@\xf1\xca\xc2\x14\xf6b\xd3\xa6\xa5\xf2\xbd?=?\x97\xc6\x9d\x9dC#\xe3\xf6\x94\xf0,\xbfC\xfb\x98\x01\x88\xcd)\x01\x1b\r\xbaj\x83b\xa2\xa3/1\xb0ZE\x00\x00\xfa\xd8mI\xb4\x89&\x99\xd5\x14\xd1\xdc\x88\xbd\xea\xd4\x03j\x9f@\xdd\xb1>\xdaG\xf7\xc9\x95\xe4\xec+\xd6\x9e\xff]\xe4=\xe25\x12J\xe0j\xbb\xe0L@\t\x01\xb6^)\x1c\x1fo(q\xd2N@W\xd3\x84\x03\x00\x00\x00^\x00\xfe\xaf\x89\x91=\x8dD\x9d\xb2T\x12\xae\x9d\xe4m]') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$TIOCMIWAIT(r5, 0x545c, 0x0) 22:51:51 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x84001, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x84103, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000040)={0xfffffffffffffff7}, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="00d2886300"/18], 0x60) r4 = getpid() sched_setscheduler(r4, 0x5, 0x0) ptrace$cont(0x17, r4, 0x0, 0x3) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000100)=r2) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8c5}, 0x28) 22:51:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x68000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)={0x100002, 0x10000}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) 22:51:52 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = getpid() r6 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = getpid() fstat(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() sendmsg$unix(r7, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6], 0xb0, 0x40010}, 0x8000) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = accept4$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x9f631ea35eb6af87, @reserved}, 0x10, 0x80800) r13 = getpid() sched_setscheduler(r13, 0x5, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r15 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r15, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r16 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r17 = getpid() fstat(r15, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getgid() sendmsg$unix(r16, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15], 0xb0, 0x40010}, 0x8000) r20 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r20, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r21 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) r22 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r22, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r23, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r24, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r25, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r26 = syz_open_pts(0xffffffffffffffff, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r27, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fcntl$getownex(r27, 0x10, &(0x7f0000000380)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r30 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r30, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r31 = socket$alg(0x26, 0x5, 0x0) bind$alg(r31, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r32 = accept4(r31, 0x0, 0x0, 0x0) r33 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r32, r33, 0x0, 0x50000000000443) r34 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f0000001840)='{procself\x00', r33}, 0x10) r35 = syz_open_dev$dspn(&(0x7f00000018c0)='/dev/dsp#\x00', 0x0, 0x80) r36 = getpid() sched_setscheduler(r36, 0x5, 0x0) r37 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r38, 0x0, 0x0) r39 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r39, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r39, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = getpid() sched_setscheduler(r41, 0x5, 0x0) r42 = geteuid() r43 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r43, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r43, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r45 = getpid() sched_setscheduler(r45, 0x5, 0x0) r46 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r46, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r46, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r48 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r48, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r49 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r50 = getpid() fstat(r48, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r52 = getgid() sendmsg$unix(r49, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r50, @ANYRES32=r51, @ANYRES32=r52, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48], 0xb0, 0x40010}, 0x8000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c00)=0x0) fstat(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, &(0x7f0000001d00)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002100)={0x0, r0, 0x0, 0xa, &(0x7f00000020c0)='net/route\x00', 0xffffffffffffffff}, 0x30) r58 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r58, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r59, 0x0, 0x0) r60 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r60, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r61 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r62 = getpid() fstat(r60, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r64 = getgid() sendmsg$unix(r61, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r62, @ANYRES32=r63, @ANYRES32=r64, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60], 0xb0, 0x40010}, 0x8000) r65 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000002140)='/dev/btrfs-control\x00', 0x200, 0x0) r66 = socket$alg(0x26, 0x5, 0x0) bind$alg(r66, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r67 = accept4(r66, 0x0, 0x0, 0x0) r68 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r67, r68, 0x0, 0x50000000000443) sendmmsg(r67, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmsg$kcm(r67, &(0x7f0000002180)={&(0x7f0000005200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000056c0)=[{&(0x7f0000005280)=""/133, 0x85}, {&(0x7f0000005340)=""/110, 0x6e}, {&(0x7f00000053c0)=""/195, 0xc3}, {&(0x7f00000054c0)=""/145, 0x91}, {&(0x7f0000005580)=""/170, 0xaa}, {&(0x7f0000005640)=""/98, 0x62}], 0x6, &(0x7f0000005740)=""/208, 0xd0}, 0x100) r70 = syz_open_dev$video(&(0x7f0000005840)='/dev/video#\x00', 0x0, 0x40000) r71 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r71, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r72 = socket$nl_route(0x10, 0x3, 0x0) r73 = getpid() sched_setscheduler(r73, 0x5, 0x0) r74 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r74, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r74, &(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, 0x0}) r76 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r76, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r77 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r78 = getpid() fstat(r76, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r80 = getgid() sendmsg$unix(r77, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r78, @ANYRES32=r79, @ANYRES32=r80, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76], 0xb0, 0x40010}, 0x8000) r81 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r81, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r82 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r83 = getpid() fstat(r81, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r85 = getgid() sendmsg$unix(r82, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r83, @ANYRES32=r84, @ANYRES32=r85, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81], 0xb0, 0x40010}, 0x8000) getgroups(0x7, &(0x7f0000005900)=[0xffffffffffffffff, r80, r85, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) r87 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r87, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r88 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r88, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r89 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r89, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r90 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000005d00)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005d40)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005e40)=0xe8) r92 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r92, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r93 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r94 = getpid() fstat(r92, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r96 = getgid() sendmsg$unix(r93, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r94, @ANYRES32=r95, @ANYRES32=r96, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92], 0xb0, 0x40010}, 0x8000) r97 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006100)={&(0x7f0000005e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x6, [@datasec={0x9, 0xa, 0x0, 0xf, 0x2, [{0x5, 0x0, 0x9}, {0x3, 0x5, 0x8000}, {0x3, 0x9, 0x2}, {0x5, 0x5, 0x80000000}, {0x5, 0x0, 0x7}, {0x5, 0x3, 0x7fffffff}, {0x5, 0x9, 0x9}, {0x4, 0x9, 0x7}, {0x1, 0x5, 0x1}, {0x1, 0x9, 0x1aa}], "d99a"}, @union={0xf, 0x6, 0x0, 0x5, 0xffff, 0x1000, [{0x5, 0x5, 0x1}, {0xf, 0x0, 0x4}, {0x5, 0x1, 0xfffffffffffff001}, {0xd, 0x3, 0x8}, {0x1, 0x1, 0x2}, {0xb, 0x5, 0x8}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2}, @datasec={0x6, 0x4, 0x0, 0xf, 0x2, [{0x1, 0x1f, 0x7}, {0x5, 0x1, 0x680}, {0x4, 0x8, 0x10000}, {0x1, 0xe92c, 0x269}], '0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x6c000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:52 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0xab, 0x3, 0x20, "d1e48eab985e735f8b83d46ce01b184d", "db7274d71e0e9413f5a8a4ebef893d777b40b6084574d08d99b76850e579cde3582feaf562fe18efce411135d0cd427c7f7faed136e30fc65aebd574ccc226a84dc5a6c3c9f6f9e69bef91d0e57dcd2917f466b8c2917127811ecb5af39528a24225a74b7114fe24125257a888709613e990e8c982350330b5f240faa80cfec0cc12aebf7e84aae71fe5de7271720e96ba3e7130ef20"}, 0xab, 0x2) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 22:51:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10100, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x4, 0x9, 0x4, 0x4000000, {0x0, 0x7530}, {0x4, 0xc, 0x3, 0x7, 0x87, 0x2, "e690e3a5"}, 0x9, 0x0, @fd, 0x4}) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4800000020000d0800000000000000000a0014000000e7000000000015000100140001007f01000000000000000000000000000114000200fe800000fe19fcb2e36700000000000000007a00219e"], 0x48}}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, 0x0) r6 = getpgid(r5) r7 = syz_open_procfs(r6, &(0x7f00000002c0)='nMt/route\x00') sendfile(r4, r7, 0x0, 0x50000000000443) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r8, @ANYBLOB="080028bd7000fbdbdf250c000000300002000400040008000100060000000800010000000000080002000800000008000100ff7f000008000100240d00000c00090008000100ff000000440007000c00040008000000000000000c00030009000000000000000c0003007f000000000000000c0003006a18000000000000080002000200000008000100050000001400060008000100060000080800010001000000"], 0xa8}, 0x1, 0x0, 0x0, 0x140}, 0x5c400) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x100, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r7, &(0x7f00000001c0)=[{{r9, r10/1000+10000}, 0xc, 0x100, 0x80000000}], 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000040)={0x0, @speck128}) 22:51:52 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8c7}, 0x28) 22:51:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x74000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x17}, 0x2c) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = openat(r4, &(0x7f0000000000)='./file0\x00', 0x200000, 0x1) accept4(r2, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000180)=0x80, 0x800) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000040)={0x3, r5}) 22:51:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8c8}, 0x28) 22:51:52 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x7a000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:53 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = getpid() r6 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = getpid() fstat(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() sendmsg$unix(r7, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6], 0xb0, 0x40010}, 0x8000) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = accept4$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x9f631ea35eb6af87, @reserved}, 0x10, 0x80800) r13 = getpid() sched_setscheduler(r13, 0x5, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r15 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r15, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r16 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r17 = getpid() fstat(r15, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getgid() sendmsg$unix(r16, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15], 0xb0, 0x40010}, 0x8000) r20 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r20, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r21 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) r22 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r22, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r23, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r24, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r25, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r26 = syz_open_pts(0xffffffffffffffff, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r27, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fcntl$getownex(r27, 0x10, &(0x7f0000000380)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r30 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r30, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r31 = socket$alg(0x26, 0x5, 0x0) bind$alg(r31, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r32 = accept4(r31, 0x0, 0x0, 0x0) r33 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r32, r33, 0x0, 0x50000000000443) r34 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f0000001840)='{procself\x00', r33}, 0x10) r35 = syz_open_dev$dspn(&(0x7f00000018c0)='/dev/dsp#\x00', 0x0, 0x80) r36 = getpid() sched_setscheduler(r36, 0x5, 0x0) r37 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r38, 0x0, 0x0) r39 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r39, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r39, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = getpid() sched_setscheduler(r41, 0x5, 0x0) r42 = geteuid() r43 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r43, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r43, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r45 = getpid() sched_setscheduler(r45, 0x5, 0x0) r46 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r46, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r46, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r48 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r48, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r49 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r50 = getpid() fstat(r48, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r52 = getgid() sendmsg$unix(r49, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r50, @ANYRES32=r51, @ANYRES32=r52, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48], 0xb0, 0x40010}, 0x8000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c00)=0x0) fstat(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, &(0x7f0000001d00)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002100)={0x0, r0, 0x0, 0xa, &(0x7f00000020c0)='net/route\x00', 0xffffffffffffffff}, 0x30) r58 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r58, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r59, 0x0, 0x0) r60 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r60, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r61 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r62 = getpid() fstat(r60, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r64 = getgid() sendmsg$unix(r61, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r62, @ANYRES32=r63, @ANYRES32=r64, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60], 0xb0, 0x40010}, 0x8000) r65 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000002140)='/dev/btrfs-control\x00', 0x200, 0x0) r66 = socket$alg(0x26, 0x5, 0x0) bind$alg(r66, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r67 = accept4(r66, 0x0, 0x0, 0x0) r68 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r67, r68, 0x0, 0x50000000000443) sendmmsg(r67, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmsg$kcm(r67, &(0x7f0000002180)={&(0x7f0000005200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000056c0)=[{&(0x7f0000005280)=""/133, 0x85}, {&(0x7f0000005340)=""/110, 0x6e}, {&(0x7f00000053c0)=""/195, 0xc3}, {&(0x7f00000054c0)=""/145, 0x91}, {&(0x7f0000005580)=""/170, 0xaa}, {&(0x7f0000005640)=""/98, 0x62}], 0x6, &(0x7f0000005740)=""/208, 0xd0}, 0x100) r70 = syz_open_dev$video(&(0x7f0000005840)='/dev/video#\x00', 0x0, 0x40000) r71 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r71, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r72 = socket$nl_route(0x10, 0x3, 0x0) r73 = getpid() sched_setscheduler(r73, 0x5, 0x0) r74 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r74, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r74, &(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, 0x0}) r76 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r76, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r77 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r78 = getpid() fstat(r76, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r80 = getgid() sendmsg$unix(r77, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r78, @ANYRES32=r79, @ANYRES32=r80, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76], 0xb0, 0x40010}, 0x8000) r81 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r81, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r82 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r83 = getpid() fstat(r81, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r85 = getgid() sendmsg$unix(r82, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r83, @ANYRES32=r84, @ANYRES32=r85, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81], 0xb0, 0x40010}, 0x8000) getgroups(0x7, &(0x7f0000005900)=[0xffffffffffffffff, r80, r85, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) r87 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r87, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r88 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r88, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r89 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r89, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r90 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000005d00)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005d40)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005e40)=0xe8) r92 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r92, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r93 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r94 = getpid() fstat(r92, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r96 = getgid() sendmsg$unix(r93, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r94, @ANYRES32=r95, @ANYRES32=r96, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92], 0xb0, 0x40010}, 0x8000) r97 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006100)={&(0x7f0000005e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x6, [@datasec={0x9, 0xa, 0x0, 0xf, 0x2, [{0x5, 0x0, 0x9}, {0x3, 0x5, 0x8000}, {0x3, 0x9, 0x2}, {0x5, 0x5, 0x80000000}, {0x5, 0x0, 0x7}, {0x5, 0x3, 0x7fffffff}, {0x5, 0x9, 0x9}, {0x4, 0x9, 0x7}, {0x1, 0x5, 0x1}, {0x1, 0x9, 0x1aa}], "d99a"}, @union={0xf, 0x6, 0x0, 0x5, 0xffff, 0x1000, [{0x5, 0x5, 0x1}, {0xf, 0x0, 0x4}, {0x5, 0x1, 0xfffffffffffff001}, {0xd, 0x3, 0x8}, {0x1, 0x1, 0x2}, {0xb, 0x5, 0x8}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2}, @datasec={0x6, 0x4, 0x0, 0xf, 0x2, [{0x1, 0x1f, 0x7}, {0x5, 0x1, 0x680}, {0x4, 0x8, 0x10000}, {0x1, 0xe92c, 0x269}], '0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x80ffffff, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cb}, 0x28) 22:51:54 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x400000000000000, 0x5, 0x0, 0x800000007f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x1a0, r2, 0xf7efe552713f4e01, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}]}, @TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffff48b8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x18, @local, 0x20}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x9, @local, 0x8001}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'vcan0\x00'}}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8aa9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2a}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x583}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x4044841}, 0x8000) [ 1640.850677][ T8746] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1640.903054][ T8746] CPU: 0 PID: 8746 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 1640.912221][ T8746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1640.922286][ T8746] Call Trace: [ 1640.925610][ T8746] dump_stack+0x172/0x1f0 [ 1640.929956][ T8746] dump_header+0x177/0x1152 [ 1640.934471][ T8746] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1640.940279][ T8746] ? ___ratelimit+0x2c8/0x595 [ 1640.944959][ T8746] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1640.950772][ T8746] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1640.956236][ T8746] ? trace_hardirqs_on+0x67/0x240 [ 1640.961264][ T8746] ? pagefault_out_of_memory+0x11c/0x11c [ 1640.966901][ T8746] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1640.972712][ T8746] ? ___ratelimit+0x60/0x595 [ 1640.977305][ T8746] ? do_raw_spin_unlock+0x57/0x270 [ 1640.982426][ T8746] oom_kill_process.cold+0x10/0x15 [ 1640.987549][ T8746] out_of_memory+0x334/0x1340 [ 1640.992234][ T8746] ? lock_downgrade+0x920/0x920 [ 1640.997097][ T8746] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1641.002909][ T8746] ? oom_killer_disable+0x280/0x280 [ 1641.008123][ T8746] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1641.013676][ T8746] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 1641.019322][ T8746] ? do_raw_spin_unlock+0x57/0x270 [ 1641.024438][ T8746] ? _raw_spin_unlock+0x2d/0x50 [ 1641.029297][ T8746] try_charge+0xf4b/0x1440 [ 1641.033724][ T8746] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1641.039276][ T8746] ? percpu_ref_tryget_live+0x111/0x290 [ 1641.044836][ T8746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1641.051090][ T8746] ? __kasan_check_read+0x11/0x20 [ 1641.056126][ T8746] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1641.061678][ T8746] mem_cgroup_try_charge+0x136/0x590 [ 1641.066969][ T8746] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1641.073234][ T8746] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1641.078881][ T8746] wp_page_copy+0x41e/0x1590 [ 1641.083471][ T8746] ? find_held_lock+0x35/0x130 [ 1641.088243][ T8746] ? pmd_pfn+0x1d0/0x1d0 [ 1641.092494][ T8746] ? lock_downgrade+0x920/0x920 [ 1641.097353][ T8746] ? swp_swapcount+0x540/0x540 [ 1641.102124][ T8746] ? __kasan_check_read+0x11/0x20 [ 1641.107151][ T8746] ? do_raw_spin_unlock+0x57/0x270 [ 1641.112274][ T8746] do_wp_page+0x499/0x14d0 [ 1641.116706][ T8746] ? finish_mkwrite_fault+0x570/0x570 [ 1641.122096][ T8746] __handle_mm_fault+0x22f1/0x3f20 [ 1641.127220][ T8746] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1641.132787][ T8746] ? __kasan_check_read+0x11/0x20 [ 1641.137826][ T8746] handle_mm_fault+0x1b5/0x6c0 [ 1641.142600][ T8746] __do_page_fault+0x536/0xdd0 [ 1641.147381][ T8746] do_page_fault+0x38/0x590 [ 1641.151891][ T8746] page_fault+0x39/0x40 [ 1641.156044][ T8746] RIP: 0033:0x4309ca [ 1641.159939][ T8746] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 9c 45 64 00 85 c0 0f 84 3a f7 ff ff [ 1641.179547][ T8746] RSP: 002b:00007ffe960527b0 EFLAGS: 00010206 [ 1641.185619][ T8746] RAX: 0000000000018691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1641.193601][ T8746] RDX: 0000555555f62930 RSI: 0000555555f6a970 RDI: 0000000000000003 [ 1641.201580][ T8746] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555f61940 [ 1641.209557][ T8746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1641.217622][ T8746] R13: 0000000000715698 R14: 000000000018fc73 R15: 0000000000002710 [ 1641.993508][ T8746] memory: usage 233160kB, limit 307200kB, failcnt 671804 [ 1642.000672][ T8746] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1642.007521][ T8746] Memory cgroup stats for /syz5: [ 1642.033463][ T8746] anon 17960960 [ 1642.033463][ T8746] file 266240 [ 1642.033463][ T8746] kernel_stack 393216 [ 1642.033463][ T8746] slab 21450752 [ 1642.033463][ T8746] sock 0 [ 1642.033463][ T8746] shmem 122880 [ 1642.033463][ T8746] file_mapped 0 [ 1642.033463][ T8746] file_dirty 0 [ 1642.033463][ T8746] file_writeback 0 [ 1642.033463][ T8746] anon_thp 16777216 [ 1642.033463][ T8746] inactive_anon 135168 [ 1642.033463][ T8746] active_anon 17960960 [ 1642.033463][ T8746] inactive_file 106496 [ 1642.033463][ T8746] active_file 0 [ 1642.033463][ T8746] unevictable 0 [ 1642.033463][ T8746] slab_reclaimable 2703360 [ 1642.033463][ T8746] slab_unreclaimable 18747392 [ 1642.033463][ T8746] pgfault 221892 [ 1642.033463][ T8746] pgmajfault 0 [ 1642.033463][ T8746] workingset_refault 0 [ 1642.033463][ T8746] workingset_activate 0 [ 1642.033463][ T8746] workingset_nodereclaim 0 [ 1642.033463][ T8746] pgrefill 69 [ 1642.033463][ T8746] pgscan 105 [ 1642.033463][ T8746] pgsteal 33 [ 1642.258022][ T8746] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=32525,uid=0 [ 1642.305512][ T8746] Memory cgroup out of memory: Killed process 32536 (syz-executor.5) total-vm:73236kB, anon-rss:2240kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 1642.366001][ T1067] [ 1642.368369][ T1067] ============================================ [ 1642.374511][ T1067] WARNING: possible recursive locking detected [ 1642.380657][ T1067] 5.3.0-rc6-next-20190830 #75 Not tainted [ 1642.386452][ T1067] -------------------------------------------- [ 1642.392601][ T1067] oom_reaper/1067 is trying to acquire lock: [ 1642.398569][ T1067] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __mmu_notifier_invalidate_range_end+0x0/0x360 [ 1642.410560][ T1067] [ 1642.410560][ T1067] but task is already holding lock: [ 1642.417927][ T1067] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 1642.428616][ T1067] [ 1642.428616][ T1067] other info that might help us debug this: [ 1642.436683][ T1067] Possible unsafe locking scenario: [ 1642.436683][ T1067] [ 1642.444146][ T1067] CPU0 [ 1642.447433][ T1067] ---- [ 1642.450713][ T1067] lock(mmu_notifier_invalidate_range_start); [ 1642.456860][ T1067] lock(mmu_notifier_invalidate_range_start); [ 1642.463020][ T1067] [ 1642.463020][ T1067] *** DEADLOCK *** [ 1642.463020][ T1067] [ 1642.471167][ T1067] May be due to missing lock nesting notation [ 1642.471167][ T1067] [ 1642.479496][ T1067] 2 locks held by oom_reaper/1067: [ 1642.484601][ T1067] #0: ffff88805a83d510 (&mm->mmap_sem#2){++++}, at: oom_reaper+0x3a7/0x1320 [ 1642.493383][ T1067] #1: ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 1642.504505][ T1067] [ 1642.504505][ T1067] stack backtrace: [ 1642.510408][ T1067] CPU: 1 PID: 1067 Comm: oom_reaper Not tainted 5.3.0-rc6-next-20190830 #75 [ 1642.519075][ T1067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1642.529213][ T1067] Call Trace: [ 1642.532519][ T1067] dump_stack+0x172/0x1f0 [ 1642.536863][ T1067] __lock_acquire.cold+0x15d/0x385 [ 1642.541991][ T1067] ? mark_held_locks+0xf0/0xf0 [ 1642.546770][ T1067] ? unmap_page_range+0x1df4/0x2380 [ 1642.551985][ T1067] lock_acquire+0x190/0x410 [ 1642.556503][ T1067] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 1642.563369][ T1067] __mmu_notifier_invalidate_range_end+0x3c/0x360 [ 1642.569800][ T1067] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 1642.576664][ T1067] ? __mmu_notifier_invalidate_range_start+0x1a5/0x210 [ 1642.583532][ T1067] __oom_reap_task_mm+0x3fa/0x490 [ 1642.588565][ T1067] ? process_shares_mm+0x130/0x130 [ 1642.593696][ T1067] ? oom_reaper+0x3a7/0x1320 [ 1642.598295][ T1067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1642.604551][ T1067] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1642.610544][ T1067] ? __kasan_check_read+0x11/0x20 [ 1642.615571][ T1067] ? do_raw_spin_unlock+0x57/0x270 [ 1642.620696][ T1067] oom_reaper+0x2b2/0x1320 [ 1642.625130][ T1067] ? lock_downgrade+0x920/0x920 [ 1642.629988][ T1067] ? __oom_reap_task_mm+0x490/0x490 [ 1642.635183][ T1067] ? trace_hardirqs_on+0x67/0x240 [ 1642.640206][ T1067] ? finish_wait+0x260/0x260 [ 1642.644806][ T1067] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1642.651042][ T1067] ? __kthread_parkme+0x108/0x1c0 [ 1642.656060][ T1067] ? __kasan_check_read+0x11/0x20 [ 1642.661092][ T1067] kthread+0x361/0x430 22:51:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[r0], 0x1) 22:51:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x90ffffff, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:58 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = getpid() tkill(r2, 0x31) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0xdb9d58336a20cd25, 0x0, 0x200}) 22:51:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cc}, 0x28) 22:51:58 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmmsg(r3, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = getpid() r6 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = getpid() fstat(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() sendmsg$unix(r7, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r6], 0xb0, 0x40010}, 0x8000) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = accept4$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x9f631ea35eb6af87, @reserved}, 0x10, 0x80800) r13 = getpid() sched_setscheduler(r13, 0x5, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r15 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r15, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r16 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r17 = getpid() fstat(r15, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getgid() sendmsg$unix(r16, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15, @ANYRES32=r15], 0xb0, 0x40010}, 0x8000) r20 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r20, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r21 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) r22 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r22, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r23, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r24, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r25, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r26 = syz_open_pts(0xffffffffffffffff, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r27, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fcntl$getownex(r27, 0x10, &(0x7f0000000380)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) r30 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r30, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r31 = socket$alg(0x26, 0x5, 0x0) bind$alg(r31, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r32 = accept4(r31, 0x0, 0x0, 0x0) r33 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r32, r33, 0x0, 0x50000000000443) r34 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f0000001840)='{procself\x00', r33}, 0x10) r35 = syz_open_dev$dspn(&(0x7f00000018c0)='/dev/dsp#\x00', 0x0, 0x80) r36 = getpid() sched_setscheduler(r36, 0x5, 0x0) r37 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r38, 0x0, 0x0) r39 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r39, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r39, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = getpid() sched_setscheduler(r41, 0x5, 0x0) r42 = geteuid() r43 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r43, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r43, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r45 = getpid() sched_setscheduler(r45, 0x5, 0x0) r46 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r46, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r46, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r48 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r48, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r49 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r50 = getpid() fstat(r48, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r52 = getgid() sendmsg$unix(r49, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r50, @ANYRES32=r51, @ANYRES32=r52, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48, @ANYRES32=r48], 0xb0, 0x40010}, 0x8000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c00)=0x0) fstat(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, &(0x7f0000001d00)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002100)={0x0, r0, 0x0, 0xa, &(0x7f00000020c0)='net/route\x00', 0xffffffffffffffff}, 0x30) r58 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r58, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(r59, 0x0, 0x0) r60 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r60, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r61 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r62 = getpid() fstat(r60, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r64 = getgid() sendmsg$unix(r61, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r62, @ANYRES32=r63, @ANYRES32=r64, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60, @ANYRES32=r60], 0xb0, 0x40010}, 0x8000) r65 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000002140)='/dev/btrfs-control\x00', 0x200, 0x0) r66 = socket$alg(0x26, 0x5, 0x0) bind$alg(r66, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r67 = accept4(r66, 0x0, 0x0, 0x0) r68 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r67, r68, 0x0, 0x50000000000443) sendmmsg(r67, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmsg$kcm(r67, &(0x7f0000002180)={&(0x7f0000005200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000056c0)=[{&(0x7f0000005280)=""/133, 0x85}, {&(0x7f0000005340)=""/110, 0x6e}, {&(0x7f00000053c0)=""/195, 0xc3}, {&(0x7f00000054c0)=""/145, 0x91}, {&(0x7f0000005580)=""/170, 0xaa}, {&(0x7f0000005640)=""/98, 0x62}], 0x6, &(0x7f0000005740)=""/208, 0xd0}, 0x100) r70 = syz_open_dev$video(&(0x7f0000005840)='/dev/video#\x00', 0x0, 0x40000) r71 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r71, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r72 = socket$nl_route(0x10, 0x3, 0x0) r73 = getpid() sched_setscheduler(r73, 0x5, 0x0) r74 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r74, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r74, &(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, 0x0}) r76 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r76, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r77 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r78 = getpid() fstat(r76, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r80 = getgid() sendmsg$unix(r77, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r78, @ANYRES32=r79, @ANYRES32=r80, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76, @ANYRES32=r76], 0xb0, 0x40010}, 0x8000) r81 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r81, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r82 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r83 = getpid() fstat(r81, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r85 = getgid() sendmsg$unix(r82, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r83, @ANYRES32=r84, @ANYRES32=r85, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81, @ANYRES32=r81], 0xb0, 0x40010}, 0x8000) getgroups(0x7, &(0x7f0000005900)=[0xffffffffffffffff, r80, r85, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) r87 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r87, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r88 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r88, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r89 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r89, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) r90 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000005d00)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005d40)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005e40)=0xe8) r92 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r92, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16c) r93 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r94 = getpid() fstat(r92, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r96 = getgid() sendmsg$unix(r93, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r94, @ANYRES32=r95, @ANYRES32=r96, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92, @ANYRES32=r92], 0xb0, 0x40010}, 0x8000) r97 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006100)={&(0x7f0000005e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x6, [@datasec={0x9, 0xa, 0x0, 0xf, 0x2, [{0x5, 0x0, 0x9}, {0x3, 0x5, 0x8000}, {0x3, 0x9, 0x2}, {0x5, 0x5, 0x80000000}, {0x5, 0x0, 0x7}, {0x5, 0x3, 0x7fffffff}, {0x5, 0x9, 0x9}, {0x4, 0x9, 0x7}, {0x1, 0x5, 0x1}, {0x1, 0x9, 0x1aa}], "d99a"}, @union={0xf, 0x6, 0x0, 0x5, 0xffff, 0x1000, [{0x5, 0x5, 0x1}, {0xf, 0x0, 0x4}, {0x5, 0x1, 0xfffffffffffff001}, {0xd, 0x3, 0x8}, {0x1, 0x1, 0x2}, {0xb, 0x5, 0x8}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2}, @datasec={0x6, 0x4, 0x0, 0xf, 0x2, [{0x1, 0x1f, 0x7}, {0x5, 0x1, 0x680}, {0x4, 0x8, 0x10000}, {0x1, 0xe92c, 0x269}], '0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000400)={0x16, 0x1, 0xfa00, {&(0x7f0000000200), 0x2, r6, 0x3c, 0x0, @ib={0x1b, 0x7, 0x100000000, {"0eab0a00"}, 0x7, 0x75a, 0xfffffffffffffc00}}}, 0xa0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x10000000000, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) 22:51:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xa0018000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:58 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) io_uring_enter(0xffffffffffffffff, 0xffffffff, 0x6, 0x2, &(0x7f0000000040)={0x2}, 0x8) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) tee(r0, r1, 0x81, 0x1b) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) fstat(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e6574317472757374656420207b23406d64f3c5198e5d9e09d87f1bc5113573756d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f5901000000567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0a1ff6ffff6007749c3a39"], 0x16c) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r11 = getpid() r12 = getgid() sendmsg$unix(r10, &(0x7f0000000900)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)="efbb199fe00f5f941bdcd2d6265d79a9d01bb1aa5cba72bc3f0ac47a9a6da9c07ed17323502a", 0x26}, {&(0x7f0000000740)="223ce1a683c50db856b3f5a8023f65749b7b8c6c5d0cb7fc7a825022dd9d8285e5b0e7ef362c12c465fb09bb90aba9a1c042fb19679a68b55d7041bb6e85229ea7a1ad7bf9b1938d85419527fc4dd7d81fcf2977fe4db6a08de556549bd61b50b68b6783da84cabd3ad46f77d0e9f22124183924", 0x74}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32, @ANYRES32=r12, @ANYBLOB="0000000018000000000200000100ef0001000000", @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xb0, 0x40010}, 0x8000) fstat(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r6, &(0x7f00000004c0)={0x1f8, 0xffffffffffffffda, 0x7, [{{0x4, 0x0, 0x0, 0x4, 0x9, 0x1, {0x6, 0x800, 0x3, 0x9, 0xdf, 0x6, 0xfff, 0x2800000000000000, 0x7, 0x101, 0x4, r8, 0xee00, 0x9, 0x4}}, {0x4, 0x9, 0x8, 0x9, 'pagemap\x00'}}, {{0x6, 0x3, 0xfffffffffffffffc, 0x80000000, 0x400, 0x800, {0x0, 0x1f, 0x7, 0x10001, 0x6, 0xa4, 0x7fffffff, 0x1, 0xffffffffffffffff, 0xe000000000, 0x4, r9, r12, 0xbd, 0x7}}, {0x1, 0x4, 0x8, 0x2, '\x83vmnet0#'}}, {{0x4, 0x3, 0x7, 0xfffffffffffffffb, 0xffff, 0x3ff, {0x5, 0x4471, 0x3ff, 0x7b, 0x0, 0x6, 0x3f, 0x1, 0x7, 0x9, 0xb5, r13, 0x0, 0xffff, 0x80}}, {0x3, 0x6, 0x9, 0xffff, 'skcipher\x00'}}]}, 0x1f8) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000000)={0x8, 0x24, 0x0, 0xff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r14, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$MON_IOCT_RING_SIZE(r3, 0x9204, 0x9661d) [ 1642.854702][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env [ 1642.892516][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:51:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8ce}, 0x28) 22:51:58 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1642.929838][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1642.950583][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:51:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xbd000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f0000000000)={0x1, 0x5, 0x399b, 0x1}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x2, 0x4000}, 0x2c) 22:51:58 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x6, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4f9, 0x10001, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x8000000000000, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x0, 0x0, 0x49da14b4017e21a}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x101080) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x11) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1643.002784][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env [ 1643.041126][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:51:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:51:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xe3ff0000, 0x0, [0xff5fff5f, 0x48]}, 0x48) [ 1643.097877][ T3892] kobject: 'loop5' (000000004ca7a155): kobject_uevent_env [ 1643.134035][ T3892] kobject: 'loop5' (000000004ca7a155): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1643.190592][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1643.207670][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1643.265446][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env [ 1643.277238][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1643.304660][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1643.317387][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:51:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:51:59 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59a, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0xe7875cdd56a993bf) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r4 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) sendfile(r2, r3, 0x0, 0x50000000000443) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000100)="ce820566fb7360e3a252a4af7f70171dd343766c172e24df4ba808248c54656ddd300d99a4fdc5b218d4005981d1aa494f3ea9d1c9ffabd75d82174f9a3fdc842167b14d6599d5ab9587aa669894dd3a739dcaf7566ad5b69f6d94954a268bd5b24a85ce0fdf2b004125389354717ada81c9e5694ad64455e05b20ea1f3af93f9836a79006efe1ed959241b2760099062572385cbad0549f7e28550bf9a3b2a1cbacbb7bc3aa18f4b495b7431193a77eb4e8cc91882c9f9efcd699528f7aa6cead9e429520500c692d7b20e7eeb82a057affdf0338f936eaa5752648f480b90d2ccd484c", 0xe4) 22:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d0}, 0x28) 22:51:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xe4ffffff, 0x0, [0xff5fff5f, 0x48]}, 0x48) [ 1643.628814][ T3892] kobject: 'loop4' (000000004593d4d4): kobject_uevent_env [ 1643.636061][ T3892] kobject: 'loop4' (000000004593d4d4): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:51:59 executing program 3: r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x40000) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x8) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f00000001c0)="4e1919eb421edea43e2a034b63dff5f3f4990461b97f635c6315ef7390394c1f0fd1f9479f25ca13cd0e3bbae2b421ef5b9deb079b32ec36b79a175c3379ece7ad0862a51f3c54a90cf8e06e5fc42c6d7f091bc686648945a7d140242d3e6c360afab44f6b31c309cce8d4d61180a7196df3195980382edbadbf09ca1090519a40173593c2fe83871d9eafb241def0a1a7c6a50378841b5af7d4ae2d19c2eb2903be739c728881d3", 0xa8}], 0x1, &(0x7f00000002c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0x18}, 0x40c4840) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x190, &(0x7f0000000280)={&(0x7f0000000100)=@ipv6_newrule={0x48, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_SRC={0x14, 0x2, @dev}]}, 0x48}}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xa}, 0x0, 0x0, 0x0, 0xe}, r2, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x2) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d1}, 0x28) 22:51:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xff000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) [ 1643.742205][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env [ 1643.762566][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1643.793028][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1643.829945][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1643.870213][ T3892] kobject: 'loop4' (000000004593d4d4): kobject_uevent_env [ 1643.891387][ T3892] kobject: 'loop4' (000000004593d4d4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1643.965215][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env [ 1643.990538][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:51:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) syz_open_procfs(r1, &(0x7f0000000000)='net/udp\x00') capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x3, 0x4000}, 0x2c) keyctl$invalidate(0x15, 0x0) 22:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d2}, 0x28) 22:51:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:51:59 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000040)) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$SG_GET_COMMAND_Q(r6, 0x2270, &(0x7f0000000080)) sendmmsg(r2, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000000)) 22:51:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xff9f0000, 0x0, [0xff5fff5f, 0x48]}, 0x48) [ 1644.019182][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1644.026358][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d3}, 0x28) 22:51:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xffff8000, 0x0, [0xff5fff5f, 0x48]}, 0x48) [ 1644.107227][ T3892] kobject: 'loop5' (000000004ca7a155): kobject_uevent_env [ 1644.147309][ T3892] kobject: 'loop5' (000000004ca7a155): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:51:59 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:51:59 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffefd, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x7f, 0x4000, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x100080, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x1, 0x0, 0x2000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x10, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x6, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d4}, 0x28) 22:51:59 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) [ 1644.241653][ T3892] kobject: 'loop4' (000000004593d4d4): kobject_uevent_env [ 1644.266503][ T3892] kobject: 'loop4' (000000004593d4d4): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:51:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xffffff80, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:51:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1644.300315][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env [ 1644.317440][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d5}, 0x28) 22:51:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x4000) read$FUSE(r1, &(0x7f0000000280), 0x1000) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000012c0), 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1a2600, 0x0) r3 = getpid() r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001300)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$TIOCGSOFTCAR(r4, 0x5419, &(0x7f0000001340)) sched_setscheduler(r3, 0x5, 0x0) ptrace$getsig(0x4202, r3, 0x1, &(0x7f00000001c0)) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000100)=""/181, &(0x7f0000000040)=0xb5) syz_open_dev$usb(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x101, 0x101200) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) futimesat(r7, &(0x7f0000001380)='./file0\x00', &(0x7f0000001400)={{0x77359400}, {0x0, 0x2710}}) [ 1644.372757][ T3892] kobject: 'loop5' (000000004ca7a155): kobject_uevent_env 22:51:59 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:51:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xffffff90, 0x0, [0xff5fff5f, 0x48]}, 0x48) [ 1644.419588][ T3892] kobject: 'loop5' (000000004ca7a155): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:51:59 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) sendfile(r1, r2, 0x0, 0x50000000000443) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x101, &(0x7f0000000040)=0x4) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1644.467524][ T3892] kobject: 'loop4' (000000004593d4d4): kobject_uevent_env 22:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d6}, 0x28) [ 1644.514617][ T3892] kobject: 'loop4' (000000004593d4d4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1644.552764][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env 22:52:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0xffffffe4, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:52:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:52:00 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000000)={0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1644.583606][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1644.622759][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env 22:52:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d7}, 0x28) [ 1644.658394][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:52:00 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$TIOCNOTTY(r5, 0x5422) sendfile(r1, r2, 0x0, 0x50000000000443) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x1f}, 0x8000}, {0xa, 0x4e23, 0x5c08, @mcast1, 0x9}, 0xffffffffffffffff, 0x3}}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) ioctl$SCSI_IOCTL_SYNC(r9, 0x4) preadv(r6, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:52:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:52:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x1000000000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) [ 1644.708963][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1644.735485][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1644.765489][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env [ 1644.789569][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1644.825740][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1644.847161][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1644.879323][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1644.893213][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1644.915568][ T3892] kobject: 'loop4' (000000004593d4d4): kobject_uevent_env [ 1644.922866][ T3892] kobject: 'loop4' (000000004593d4d4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1644.936961][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1644.944416][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1644.958463][ T3892] kobject: 'loop4' (000000004593d4d4): kobject_uevent_env [ 1644.965711][ T3892] kobject: 'loop4' (000000004593d4d4): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:52:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x4000}, 0x2c) 22:52:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000050000400404000001000000b7050000040000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cbab3fcd62c7d1c6238975d43a4505f80fc887b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa35f90e984c46ea7e2b347a36f5662403e91c30518e8a180595b36e2019872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f90cb9bf4e418df6fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b10000000000000000001f69fafd31fc2fc3503479c11b36d490cee31d133f00000000000000000000000000009c000000272a33e20ed62b6d63f8eac19c5cec18fc0fed548e3849c589af305a7cd455bc4d46e0293699f0688c1aca17982ab54490437083b63e0e6784c02183217989e3ca5e2f4a1c3dea2b25"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d8}, 0x28) 22:52:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x20000000000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:52:00 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000080)={r3, 0x6, 0x8}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:52:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:52:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:52:00 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0xfffffffffffffd6e, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 22:52:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x40000000000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) [ 1645.292394][ T3892] kobject: 'loop5' (000000004ca7a155): kobject_uevent_env [ 1645.304300][ T3892] kobject: 'loop5' (000000004ca7a155): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:52:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8d9}, 0x28) [ 1645.336856][ T3892] kobject: 'loop4' (000000004593d4d4): kobject_uevent_env [ 1645.366868][ T3892] kobject: 'loop4' (000000004593d4d4): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:52:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:52:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8da}, 0x28) [ 1645.418844][ T3892] kobject: 'loop0' (00000000814e1153): kobject_uevent_env [ 1645.454333][ T3892] kobject: 'loop0' (00000000814e1153): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:52:00 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1645.466657][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env [ 1645.477015][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1645.533701][ T3892] kobject: 'loop4' (000000004593d4d4): kobject_uevent_env [ 1645.572117][ T3892] kobject: 'loop4' (000000004593d4d4): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:52:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8cf}, 0x28) 22:52:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xffe4, &(0x7f00000001c0)=""/195, 0x60000000000000, 0x0, [0xff5fff5f, 0x48]}, 0x48) 22:52:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x2d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xfffffffffffffe8e, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x8db}, 0x28) [ 1645.609866][ T3892] kobject: 'loop2' (0000000038ea531e): kobject_uevent_env [ 1645.639583][ T3892] kobject: 'loop2' (0000000038ea531e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:52:01 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f,