, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0}, 0x28) 12:03:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0}, 0x28) 12:03:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0}, 0x28) 12:03:47 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x0, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0}, 0x28) 12:03:47 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:47 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:47 executing program 2: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:47 executing program 1: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:47 executing program 4: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:48 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:48 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x0, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:48 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:48 executing program 2: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0xfff, 0x2}, {0x3f, 0xfffffffffffeffff}], r0}, 0x18, 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:48 executing program 1: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:48 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x500, 0x0) openat(r1, &(0x7f0000000180)='./file0\x00', 0x101000, 0x146) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000001c0)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="3a88534a97a8762a515dec93baf4a98161978016df6ec750ae029bc63789b59ee60ceccefa40735c25107d52d18753b4bc561d382db5fa9b1390c0a64f7b", 0x3e}], 0x4}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc", 0x34}], 0x1}, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r3, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000000c0)) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:49 executing program 2: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x0, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 630.310137] net_ratelimit: 20 callbacks suppressed [ 630.310144] protocol 88fb is buggy, dev hsr_slave_0 [ 630.320343] protocol 88fb is buggy, dev hsr_slave_1 12:03:49 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:49 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0x0, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 630.560153] protocol 88fb is buggy, dev hsr_slave_0 [ 630.565462] protocol 88fb is buggy, dev hsr_slave_1 12:03:49 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0x0, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x325) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x1b, &(0x7f0000000040)="15740600e7ae5ef3ebbb8a27d64295c767cb904e", 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$setopts(0x8000000004200, r2, 0x0, 0xffffffffffffffff) tkill(r2, 0x36) fcntl$setstatus(r0, 0x4, 0x10000042806) [ 630.791051] protocol 88fb is buggy, dev hsr_slave_0 [ 630.796894] protocol 88fb is buggy, dev hsr_slave_1 12:03:50 executing program 2: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x0, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:50 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 631.511742] protocol 88fb is buggy, dev hsr_slave_0 [ 631.518438] protocol 88fb is buggy, dev hsr_slave_1 12:03:50 executing program 1: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:50 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 631.681030] protocol 88fb is buggy, dev hsr_slave_0 [ 631.686995] protocol 88fb is buggy, dev hsr_slave_1 12:03:51 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x22) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:51 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x22) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:51 executing program 4: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x0, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:51 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x22) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:51 executing program 2: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0x0, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:51 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:51 executing program 1: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:51 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0x0, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:52 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x0, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:52 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/psched\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:52 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:52 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/psched\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:52 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/psched\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:52 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@rand_addr, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@bridge_delneigh={0x7c, 0x1d, 0x8, 0x70bd2d, 0x25dfdbfe, {0xa, 0x0, 0x0, r2, 0x21, 0xb0, 0x8}, [@NDA_SRC_VNI={0x8, 0xb, 0xfffffffffffffffb}, @NDA_DST_IPV6={0x14, 0x1, @loopback}, @NDA_LLADDR={0xc, 0x2, @random="6c78f2332fa0"}, @NDA_MASTER={0x8, 0x9, 0xfffffffffffffff7}, @NDA_DST_MAC={0xc, 0x1, @remote}, @NDA_LINK_NETNSID={0x8, 0xa, 0x6}, @NDA_DST_IPV4={0x8, 0x1, @multicast1}, @NDA_DST_IPV6={0x14, 0x1, @dev={0xfe, 0x80, [], 0x2a}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000850}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:53 executing program 4: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x0, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:53 executing program 2: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0x0, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:53 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0x0, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:53 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)=0x200000000000006) 12:03:53 executing program 1: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x0, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:53 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:53 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)=0x200000000000006) 12:03:53 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)=0x200000000000006) 12:03:53 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x402801, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x80000000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="360000002589e78ecd6a3565575179af15d554b3e10c9617df5ed555ce5087363a53149fbc8473d428e460c3761238dd0bbb4bc5c0d8bec40900"], &(0x7f00000001c0)=0x3e) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) delete_module(&(0x7f0000000240)='status\x00', 0x200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:54 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x402801, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x80000000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="360000002589e78ecd6a3565575179af15d554b3e10c9617df5ed555ce5087363a53149fbc8473d428e460c3761238dd0bbb4bc5c0d8bec40900"], &(0x7f00000001c0)=0x3e) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) delete_module(&(0x7f0000000240)='status\x00', 0x200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:54 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x402801, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x80000000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="360000002589e78ecd6a3565575179af15d554b3e10c9617df5ed555ce5087363a53149fbc8473d428e460c3761238dd0bbb4bc5c0d8bec40900"], &(0x7f00000001c0)=0x3e) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) delete_module(&(0x7f0000000240)='status\x00', 0x200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:03:54 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:54 executing program 4: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x0, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:54 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:54 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0x0, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:54 executing program 2: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0x0, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:54 executing program 1: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x0, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 635.681275] net_ratelimit: 16 callbacks suppressed [ 635.681482] protocol 88fb is buggy, dev hsr_slave_0 [ 635.695436] protocol 88fb is buggy, dev hsr_slave_1 [ 635.831733] protocol 88fb is buggy, dev hsr_slave_0 [ 635.839318] protocol 88fb is buggy, dev hsr_slave_1 [ 635.991530] protocol 88fb is buggy, dev hsr_slave_0 [ 636.002346] protocol 88fb is buggy, dev hsr_slave_1 12:03:55 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:55 executing program 1: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x0, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:55 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:55 executing program 2: 12:03:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) tgkill(r1, r1, 0x0) 12:03:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 12:03:55 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000d80)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) open(&(0x7f0000000280)='./file0\x00', 0x90080, 0x4) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000009c0)) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xe19, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000001c0)=""/30) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') unshare(0x8000400) r4 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f7, 0xfffffffffffffffd, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x10000, 0x0, 0x0, 0xf000], 0xf7, 0x1, 0x4}) r5 = gettid() mq_notify(r4, &(0x7f0000000480)={0x0, 0x3, 0x0, @tid=r5}) fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={r5, r6, r7}, 0xc) write$P9_RREAD(r1, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x12e) mq_timedsend(r4, 0x0, 0xfed7, 0x1, 0x0) fcntl$setown(r1, 0x8, r5) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000780)=0x2) r8 = request_key(&(0x7f0000000200)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='keyring\x006\xf9\x12l\x12\x05O\\\x0e\x18\xc6R%s\xddy\xf1\xa0\xa3\xa6\tW\xd6\xc7)\xad\x85l\xd8\xf0\xdf\x9c\x04\xd1\x8eW\x90K\x1c\x05 \x9d\xee\x12\xf5\xcc\xc1-\x98\xa7\x007g46a\x0f\xaa\xc8\x8b\xcf\x96\x81\x91\x87\x89\xc2\xadG6e\x98K\x17\x86\x8d\x9c^\x90\x81>\x9e\xc1\xf7?\xde\xbfV8\xf9\xc0\x1f\x88!\xf1\xf7\x8e\xba\xc9\x84\xe3\x85.\xe1\x00', 0xffffffffffffffff) r9 = dup3(r1, r1, 0x80000) write$FUSE_POLL(r9, &(0x7f00000006c0)={0x18, 0x0, 0x4, {0x400}}, 0x18) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r8) getsockopt$EBT_SO_GET_ENTRIES(r9, 0x0, 0x81, 0x0, 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r4, 0x0) 12:03:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) recvfrom$inet6(r1, 0x0, 0xfffffffffffffe8d, 0x0, 0x0, 0xfffffdcf) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x100000000a, &(0x7f0000000240)=0x800000001, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r2, &(0x7f00000003c0)="dd", 0x1, 0x0, 0x0, 0x0) [ 636.550200] protocol 88fb is buggy, dev hsr_slave_0 [ 636.555460] protocol 88fb is buggy, dev hsr_slave_1 12:03:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000a060100"/20], 0x14}}, 0x0) [ 636.790159] protocol 88fb is buggy, dev hsr_slave_0 [ 636.795462] protocol 88fb is buggy, dev hsr_slave_1 12:03:55 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000d80)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) open(&(0x7f0000000280)='./file0\x00', 0x90080, 0x4) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000009c0)) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xe19, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000001c0)=""/30) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') unshare(0x8000400) r4 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f7, 0xfffffffffffffffd, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x10000, 0x0, 0x0, 0xf000], 0xf7, 0x1, 0x4}) r5 = gettid() mq_notify(r4, &(0x7f0000000480)={0x0, 0x3, 0x0, @tid=r5}) fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={r5, r6, r7}, 0xc) write$P9_RREAD(r1, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x12e) mq_timedsend(r4, 0x0, 0xfed7, 0x1, 0x0) fcntl$setown(r1, 0x8, r5) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000780)=0x2) r8 = request_key(&(0x7f0000000200)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='keyring\x006\xf9\x12l\x12\x05O\\\x0e\x18\xc6R%s\xddy\xf1\xa0\xa3\xa6\tW\xd6\xc7)\xad\x85l\xd8\xf0\xdf\x9c\x04\xd1\x8eW\x90K\x1c\x05 \x9d\xee\x12\xf5\xcc\xc1-\x98\xa7\x007g46a\x0f\xaa\xc8\x8b\xcf\x96\x81\x91\x87\x89\xc2\xadG6e\x98K\x17\x86\x8d\x9c^\x90\x81>\x9e\xc1\xf7?\xde\xbfV8\xf9\xc0\x1f\x88!\xf1\xf7\x8e\xba\xc9\x84\xe3\x85.\xe1\x00', 0xffffffffffffffff) r9 = dup3(r1, r1, 0x80000) write$FUSE_POLL(r9, &(0x7f00000006c0)={0x18, 0x0, 0x4, {0x400}}, 0x18) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r8) getsockopt$EBT_SO_GET_ENTRIES(r9, 0x0, 0x81, 0x0, 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r4, 0x0) 12:03:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001600010400000000000000000a0000001800000014000100fe88000000005ae62a6600"/48], 0x2c}}, 0x0) 12:03:56 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000100)) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x1, 0x800) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) 12:03:56 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:56 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:03:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 12:03:56 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r0, &(0x7f0000000240)=""/4096, 0x1000) syz_open_dev$mice(0x0, 0x0, 0x0) 12:03:56 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x80, &(0x7f0000ffb000/0x1000)=nil) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0//ile0\x00', 0x800000000000000) r0 = shmget(0x3, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000080)=""/21) 12:03:56 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:03:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 12:03:56 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r0, &(0x7f0000000240)=""/4096, 0x1000) syz_open_dev$mice(0x0, 0x0, 0x0) 12:03:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 12:03:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_opts(r0, 0x0, 0x1, 0x0, &(0x7f0000000100)) recvfrom$inet(r0, 0x0, 0x40e, 0x0, 0x0, 0x800e005a5) shutdown(r0, 0x0) 12:03:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000000)=""/118, 0x76}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) semop(0x0, 0x0, 0xfffffe58) recvfrom$inet(r2, 0x0, 0x41, 0x0, 0x0, 0x800e0051d) shutdown(r2, 0x0) 12:03:57 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) open$dir(0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) 12:03:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') unlinkat(0xffffffffffffffff, 0x0, 0x0) write$P9_RCREATE(r0, 0x0, 0x0) 12:03:57 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(0xffffffffffffffff, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000040), 0xffffff7e) r1 = dup2(r0, r0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080), 0x4) 12:03:57 executing program 2: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) keyctl$session_to_parent(0x12) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) stat(&(0x7f0000000280)='./file0/file0\x00', 0x0) 12:03:57 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) poll(0x0, 0x0, 0x46) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0051e) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/115, 0x73}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) dup2(r2, r3) shutdown(r3, 0x0) 12:03:59 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:03:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000000)=""/118, 0x76}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) socketpair(0x0, 0x0, 0x42cd7567, 0x0) recvfrom$inet(r2, 0x0, 0x41, 0x0, 0x0, 0x800e0051d) shutdown(r2, 0x0) 12:03:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) poll(&(0x7f0000000080)=[{r0}, {r0}], 0x2, 0x46) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0051e) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/115, 0x73}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) dup2(r2, r3) shutdown(r3, 0x0) 12:03:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)=""/3, 0x3}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/3, 0x3}, {0x0}], 0x2) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/87, 0x57}, {0x0}, {0x0}], 0x3) shutdown(r4, 0x0) shutdown(r1, 0x0) 12:03:59 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:03:59 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) poll(&(0x7f0000000080)=[{}, {r0}, {}], 0x3, 0x46) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0051e) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/115, 0x73}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) dup2(r2, r3) shutdown(r3, 0x0) [ 640.710194] net_ratelimit: 10 callbacks suppressed [ 640.710201] protocol 88fb is buggy, dev hsr_slave_0 [ 640.720390] protocol 88fb is buggy, dev hsr_slave_1 12:03:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000000)=""/118, 0x76}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) fcntl$setown(r1, 0x6, 0x0) recvfrom$inet(r1, 0x0, 0x41, 0x0, 0x0, 0x800e0051d) shutdown(r1, 0x0) 12:03:59 executing program 5: 12:03:59 executing program 2: 12:03:59 executing program 4: 12:03:59 executing program 5: 12:04:00 executing program 2: [ 640.951685] protocol 88fb is buggy, dev hsr_slave_0 [ 640.957739] protocol 88fb is buggy, dev hsr_slave_1 12:04:02 executing program 5: 12:04:02 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:02 executing program 2: 12:04:02 executing program 4: 12:04:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000000)=""/118, 0x76}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) fcntl$setown(r1, 0x6, 0x0) recvfrom$inet(r1, 0x0, 0x41, 0x0, 0x0, 0x800e0051d) shutdown(r1, 0x0) 12:04:02 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:02 executing program 5: 12:04:02 executing program 2: 12:04:02 executing program 4: 12:04:02 executing program 2: 12:04:02 executing program 4: 12:04:02 executing program 5: 12:04:02 executing program 0: [ 643.992171] protocol 88fb is buggy, dev hsr_slave_0 [ 643.997623] protocol 88fb is buggy, dev hsr_slave_1 12:04:05 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:05 executing program 4: 12:04:05 executing program 2: 12:04:05 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:05 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:05 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:05 executing program 2: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:05 executing program 4: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 646.951130] protocol 88fb is buggy, dev hsr_slave_0 [ 646.957456] protocol 88fb is buggy, dev hsr_slave_1 [ 647.190981] protocol 88fb is buggy, dev hsr_slave_0 [ 647.198423] protocol 88fb is buggy, dev hsr_slave_1 [ 647.431217] protocol 88fb is buggy, dev hsr_slave_0 [ 647.439064] protocol 88fb is buggy, dev hsr_slave_1 12:04:06 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:06 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:06 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:07 executing program 4: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 648.150600] protocol 88fb is buggy, dev hsr_slave_0 [ 648.155758] protocol 88fb is buggy, dev hsr_slave_1 [ 648.320190] protocol 88fb is buggy, dev hsr_slave_0 [ 648.325373] protocol 88fb is buggy, dev hsr_slave_1 12:04:08 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:08 executing program 2: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:08 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:08 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:08 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x325) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x1b, &(0x7f0000000040)="15740600e7ae5ef3ebbb8a27d64295c767cb904e", 0x14) socket$inet(0x2, 0x800, 0x3f) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x36) fcntl$setstatus(r0, 0x4, 0x10000042806) 12:04:09 executing program 4: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:09 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:09 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:09 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r3}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) r5 = semget$private(0x0, 0x0, 0x14) geteuid() r6 = getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000680)={{0x0, 0x0, r7, r6, r8, 0x0, 0x2}, 0xdbb, 0x0, 0x81}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x0, 0x18}, 0xc) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000100)) 12:04:09 executing program 2: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:10 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x9, 0x6, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324c4", 0x81, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(r4, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:11 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000040)={'bond_slave_1\x00', @ifru_ivalue=0xa28}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000680)="230000005e0081aee4050c00000f00000000a30000ffffff9e8b1832e0b58bc609f6d8", 0x23}], 0x1}, 0x0) 12:04:11 executing program 2 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:11 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:11 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:11 executing program 5 (fault-call:3 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:12 executing program 4 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x200040) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'pids'}]}, 0x6) accept(r0, &(0x7f00000002c0)=@hci={0x1f, 0x0}, &(0x7f0000000400)=0x80) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x1, &(0x7f00000000c0)=@raw=[@generic={0xd56, 0x1, 0x5, 0x7ff, 0x9}], &(0x7f0000000100)='GPL\x00', 0x6, 0x2e, &(0x7f0000000280)=""/46, 0x41f00, 0x3, [], r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x6, 0x3, 0x4}, 0x10}, 0x70) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000020065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = dup(r0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x2a, 0x9}, {0x7, 0xffffffffffffff01}, 0x3, 0x2, 0x5}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 653.100495] FAULT_INJECTION: forcing a failure. [ 653.100495] name failslab, interval 1, probability 0, space 0, times 0 [ 653.190938] net_ratelimit: 14 callbacks suppressed [ 653.190976] protocol 88fb is buggy, dev hsr_slave_0 [ 653.195523] CPU: 1 PID: 23336 Comm: syz-executor.4 Not tainted 4.14.133 #28 [ 653.196388] protocol 88fb is buggy, dev hsr_slave_1 [ 653.201135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.201168] Call Trace: [ 653.201221] dump_stack+0x138/0x19c [ 653.201253] should_fail.cold+0x10f/0x159 [ 653.201277] should_failslab+0xdb/0x130 [ 653.201294] __kmalloc+0x2f0/0x7a0 [ 653.240673] ? lock_downgrade+0x6e0/0x6e0 [ 653.244861] ? bpf_test_init.isra.0+0x7c/0xe0 [ 653.249383] bpf_test_init.isra.0+0x7c/0xe0 [ 653.253725] bpf_prog_test_run_skb+0xe5/0x9a0 [ 653.258240] ? __fget_light+0x172/0x1f0 [ 653.262232] ? bpf_test_init.isra.0+0xe0/0xe0 [ 653.266741] ? fput+0xd4/0x150 [ 653.269948] ? __bpf_prog_get+0x153/0x1a0 [ 653.274114] SyS_bpf+0x749/0x38f3 [ 653.277584] ? bpf_test_init.isra.0+0xe0/0xe0 [ 653.282095] ? bpf_prog_get+0x20/0x20 [ 653.285919] ? wait_for_completion+0x420/0x420 [ 653.290524] ? __sb_end_write+0xc1/0x100 [ 653.294608] ? fput+0xd4/0x150 [ 653.297814] ? SyS_write+0x15e/0x230 [ 653.301554] ? bpf_prog_get+0x20/0x20 [ 653.305390] do_syscall_64+0x1e8/0x640 [ 653.309288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 653.314154] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 653.319354] RIP: 0033:0x459819 [ 653.322552] RSP: 002b:00007f5c76dd0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 653.330275] RAX: ffffffffffffffda RBX: 00007f5c76dd0c90 RCX: 0000000000459819 12:04:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000fefff0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404010000004404000001007d60bf030000000000006a0a00fe00000000850000000d000000b70000000000cdde00000000000000000000000a01e04531bc7330024f0232"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 653.337587] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a [ 653.344868] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 653.352148] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c76dd16d4 [ 653.359426] R13: 00000000004bfb92 R14: 00000000004d15b8 R15: 0000000000000004 [ 653.430159] protocol 88fb is buggy, dev hsr_slave_0 [ 653.435383] protocol 88fb is buggy, dev hsr_slave_1 12:04:14 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 12:04:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0x20000800, 0x1000, 0x100000000, 0x0, 0x6, 0xffa, 0x3, 0x40, 0x4}, 0x10) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x5, 0x100000800) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4d84ca5d171f0ff00000000b7060000ffffffff2d64050000000000650f64a7a40000000404000001007d60b7030000000000006a0a00fe10000000850000000d000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x8200, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000002c0)=0xa30, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000408000000a30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f0000000080)=@fragment={0x1, 0x0, 0x7fffffff, 0x6, 0x0, 0x6, 0x65}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f0000000100)={0x0, 0x9, 0x2, [], &(0x7f00000000c0)=0x6}) 12:04:14 executing program 4 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:14 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = semget(0x1, 0x7, 0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) openat$cgroup_ro(r2, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) semctl$GETVAL(r1, 0x2, 0xc, &(0x7f0000000400)=""/4096) [ 655.929706] FAULT_INJECTION: forcing a failure. [ 655.929706] name failslab, interval 1, probability 0, space 0, times 0 [ 655.969392] CPU: 1 PID: 23365 Comm: syz-executor.4 Not tainted 4.14.133 #28 12:04:15 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000010bfa30000010000000703000000feffff7a0af0fff8ffffff79a4f0060000ffffffff2d640500000000006504040001009c8fc2df00000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000700"], &(0x7f0000000340)='syzkaller\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000880)=0xe8) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() r8 = accept4(r2, 0x0, &(0x7f0000000ec0), 0x80800) setsockopt$inet_int(r8, 0x0, 0x12, &(0x7f0000000f00)=0xfa7, 0x4) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0]) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000000e00)={{}, {}, [{0x2, 0x0, r3}, {0x2, 0x2, r4}, {0x2, 0x1, r5}], {0x4, 0x1}, [{0x8, 0x2, r6}, {0x8, 0x3, r7}, {0x8, 0x4, r9}, {0x8, 0x7, r10}, {0x8, 0x4, r11}, {0x8, 0x6, r12}, {0x8, 0x2, r13}, {0x8, 0x6, r14}, {0x8, 0x2, r15}, {0x8, 0x6, r16}], {0x10, 0x5}, {0x20, 0x1}}, 0x8c, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xffffffee, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) prctl$PR_GET_CHILD_SUBREAPER(0x25) r17 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0xea, 0x20000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f0000000040)='./file0\x00', r17}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={r17, &(0x7f0000000400)="3d6c120981d352711228c3a732400d38bc2d570110b4b17832f8600da9d7f4727904a11e3980d060e830a268ae6d756d19457b43dac07af6d92d5dfa121de0096960da6c080622f7319601e941118dc3677191712b4460e57b0530165c94da87b4a846fd04101ab74ed5c7a71dcb62833217d2200f44793b1f1a8101fcfac9f617d7fac815df44e858eedfc34824cef6f7dbc2227f0e591cf94455c17f2440e0f65e802102b0d4da91ef4fe730cf2420ae4c95944e0b38b860dcb92428c90e5c707aaff934cf7724bbd378ebbca3bf94bc89de83e3a393469cca551880b2", &(0x7f0000000080)=""/141}, 0x18) ioctl$PPPOEIOCSFWD(r17, 0x4008b100, &(0x7f0000000500)={0x18, 0x0, {0x4, @dev={[], 0x10}, 'syz_tun\x00'}}) [ 655.976557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.985961] Call Trace: [ 655.988593] dump_stack+0x138/0x19c [ 655.992367] should_fail.cold+0x10f/0x159 [ 655.996560] should_failslab+0xdb/0x130 [ 656.000586] kmem_cache_alloc+0x47/0x780 [ 656.004696] ? __phys_addr+0x78/0xe0 [ 656.004711] ? kasan_unpoison_shadow+0x35/0x50 [ 656.013036] __build_skb+0x35/0x2e0 [ 656.016700] build_skb+0x1f/0x160 [ 656.020221] bpf_prog_test_run_skb+0x157/0x9a0 [ 656.024845] ? __fget_light+0x172/0x1f0 [ 656.028849] ? bpf_test_init.isra.0+0xe0/0xe0 [ 656.033374] ? fput+0xd4/0x150 [ 656.036588] ? __bpf_prog_get+0x153/0x1a0 [ 656.040774] SyS_bpf+0x749/0x38f3 [ 656.044261] ? bpf_test_init.isra.0+0xe0/0xe0 [ 656.048876] ? bpf_prog_get+0x20/0x20 [ 656.052708] ? wait_for_completion+0x420/0x420 [ 656.057315] ? __sb_end_write+0xc1/0x100 [ 656.061418] ? fput+0xd4/0x150 [ 656.064642] ? SyS_write+0x15e/0x230 [ 656.068404] ? bpf_prog_get+0x20/0x20 [ 656.072242] do_syscall_64+0x1e8/0x640 [ 656.076152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 656.081030] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 656.086247] RIP: 0033:0x459819 [ 656.089451] RSP: 002b:00007f5c76dd0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 656.097188] RAX: ffffffffffffffda RBX: 00007f5c76dd0c90 RCX: 0000000000459819 [ 656.104474] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a [ 656.111769] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 656.119066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c76dd16d4 12:04:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000004000000bfa300000000000007ffbd0a1fbcf8ffffff79a4f0ff00000000b706002900ffffffff2d64050000000000656e6c5194d3d4d883c33e8a660404000100ecff0304000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000001d73eeb6e0f5c20d3a9ff8781a85fef327c6c4cdf20de323e74600"/150], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 656.126882] R13: 00000000004bfb92 R14: 00000000004d15b8 R15: 0000000000000004 12:04:15 executing program 4 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x20040) write$cgroup_int(r1, &(0x7f0000000080)=0x4, 0x12) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000280)="2bd8f7741c035ba144d8ab635aca424695886ba5a48849687f509e5502449380dc7fd82c51e6370782b40a015c8e2eb7a413ca2f0666ad73a284", 0x3a, r2) [ 656.252479] FAULT_INJECTION: forcing a failure. [ 656.252479] name failslab, interval 1, probability 0, space 0, times 0 [ 656.263935] CPU: 1 PID: 23386 Comm: syz-executor.4 Not tainted 4.14.133 #28 [ 656.271156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.280535] Call Trace: [ 656.283167] dump_stack+0x138/0x19c [ 656.286852] should_fail.cold+0x10f/0x159 [ 656.291060] should_failslab+0xdb/0x130 [ 656.295071] kmem_cache_alloc+0x47/0x780 [ 656.299168] skb_clone+0x129/0x320 [ 656.302786] bpf_clone_redirect+0xa3/0x2f0 [ 656.307055] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 656.311835] ? SyS_bpf+0x749/0x38f3 [ 656.315516] bpf_prog_3aea14b1f6cd0d8b+0xba6/0x1000 [ 656.320572] ? trace_hardirqs_on+0x10/0x10 [ 656.324846] ? trace_hardirqs_on+0x10/0x10 [ 656.329109] ? bpf_test_run+0x44/0x330 [ 656.333035] ? find_held_lock+0x35/0x130 [ 656.337122] ? bpf_test_run+0x44/0x330 [ 656.341046] ? lock_acquire+0x16f/0x430 [ 656.345045] ? check_preemption_disabled+0x3c/0x250 [ 656.350093] ? bpf_test_run+0xa8/0x330 [ 656.354048] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 656.358838] ? bpf_test_init.isra.0+0xe0/0xe0 [ 656.363366] ? fput+0xd4/0x150 [ 656.366710] ? __bpf_prog_get+0x153/0x1a0 [ 656.370912] ? SyS_bpf+0x749/0x38f3 [ 656.374671] ? bpf_test_init.isra.0+0xe0/0xe0 [ 656.379201] ? bpf_prog_get+0x20/0x20 [ 656.383031] ? wait_for_completion+0x420/0x420 [ 656.387638] ? __sb_end_write+0xc1/0x100 [ 656.391735] ? fput+0xd4/0x150 [ 656.394961] ? SyS_write+0x15e/0x230 [ 656.398734] ? bpf_prog_get+0x20/0x20 [ 656.402656] ? do_syscall_64+0x1e8/0x640 [ 656.406766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 656.411640] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:04:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080)=0x5a960654, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x3d3, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 656.470267] protocol 88fb is buggy, dev hsr_slave_0 [ 656.475410] protocol 88fb is buggy, dev hsr_slave_1 [ 656.630159] protocol 88fb is buggy, dev hsr_slave_0 [ 656.635355] protocol 88fb is buggy, dev hsr_slave_1 12:04:17 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = dup2(r1, r1) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000080500004803000008020000000000004803000048030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000800200"/64], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0010802000000000000000000000000000000000000000000000000f800726563656e74000000000000000000000000000000000000000000000000f8ffffff00000080000173797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000072000000000048004c454400000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000002000000ff01000000000000fe800000000000000000000000000010ed5264b281b2892838a826629ecbef6900000000ffffff0000000000000000ff000000ff00000000ffffffff000000ff697036677265300000000000000000006272696467655f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000907010000000000000000000000000000001801400100000000000000000000000000000000000000000000000028006575693634000000000000000000000000000000000000000000000000000000000000000000280069636d7036000000000000000000000000000000000000000000000000000f05000100000000280053594e50524f58590000000000000000000000000000000000000000000000008e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f00000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000001c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x568) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) write$smack_current(r2, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x1d) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 12:04:17 executing program 4 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:17 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001440)='/selinux/status\x00', 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000001600)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x814000}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)=@getsadinfo={0xf4, 0x23, 0x28, 0x70bd29, 0x25dfdbfe, 0x0, [@mark={0xc, 0x15, {0x35075b, 0xe7fb}}, @mark={0xc, 0x15, {0x350759, 0x4}}, @replay_val={0x10, 0xa, {0x70bd2b, 0x70bd2d, 0x4}}, @replay_esn_val={0x3c, 0x17, {0x8, 0x70bd27, 0x70bd27, 0x70bd25, 0x70bd2b, 0x8, [0x1, 0x8, 0x3ff, 0x1f, 0x1, 0x90000, 0x9eb8, 0x2]}}, @sec_ctx={0x68, 0x8, {0x64, 0x8, 0x1, 0x3ff, 0x5c, "1d3d193c32920266c359f842be9c348b00a94c4a4c9954a89f9654c1a0658858b9b0b5abf0f1594ebde7c57c2abb38a2cc7b5e1c02fd3aa263af90fbbaefbe5cc753c59645f749853e1ce7593a5b9dbdb68fdd9c0ccd49e3dddcd2ee"}}, @ipv6_hthresh={0x8, 0x4, {0x47, 0x39}}, @mark={0xc, 0x15, {0x35075d, 0x1386}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdae3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0x8, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x56}, @ldst={0x0, 0x3, 0x3, 0xf, 0x9, 0xc0, 0xfffffffffffffffd}, @jmp={0x5, 0x90, 0xb, 0x8, 0xf, 0xffffffffffffffff, 0xfffffffffffffff0}, @alu={0x7, 0x8000, 0x9, 0xe, 0x6, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x2, 0x1, 0x6, 0x0, 0x0, 0xffffffffffffffc0, 0x8}, @generic={0x8, 0x1ff, 0x5f, 0x8000000, 0x1}, @alu={0x7, 0xfffffffffffffffa, 0xf, 0xd, 0xd, 0xfffffffffffffff8, 0x4}, @alu={0x7, 0x2, 0xe, 0xb, 0xb, 0xfffffffffffffffc, 0xffffffffffffffff}], &(0x7f00000000c0)='GPL\x00', 0x8000, 0x0, 0x0, 0x0, 0x4, [], r1, 0x0, r0, 0x8, &(0x7f0000000500)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0xa, 0x8, 0xbe}, 0x10}, 0x70) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000a97c1a510404d3a0597e69e5c90d75df94de1a999a4f9a7769ac50042b836b3cca0cfd967db1961f311db2b621e264443eaccbc8456670faed4882d7cccdbe2a649fc9916112bfbb6e3dd55fec0171be16ae8a87413813f1ddc9d402fae39239015808d7ef439c3d3cb7531ea85810a6bfe9e9bc35224375d8a251dd01"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2733}, 0x10}, 0x70) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000002c0)={@empty, 0x43, r3}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:17 executing program 5: mount$9p_rdma(&(0x7f0000000280)='127.0.0.1\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x110003, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/306]) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x2, 0x22000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x181) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065042555d6c44377ff0400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x3}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:17 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 658.951855] FAULT_INJECTION: forcing a failure. [ 658.951855] name failslab, interval 1, probability 0, space 0, times 0 [ 658.963554] CPU: 1 PID: 23405 Comm: syz-executor.4 Not tainted 4.14.133 #28 [ 658.970683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.980061] Call Trace: [ 658.982686] dump_stack+0x138/0x19c [ 658.986360] should_fail.cold+0x10f/0x159 [ 658.990534] should_failslab+0xdb/0x130 [ 658.994529] kmem_cache_alloc_node_trace+0x5a/0x770 [ 658.999570] ? save_trace+0x290/0x290 [ 659.003393] __kmalloc_node_track_caller+0x3d/0x80 [ 659.008366] __kmalloc_reserve.isra.0+0x40/0xe0 [ 659.013070] pskb_expand_head+0x116/0xc10 [ 659.017224] ? __copy_skb_header+0x2b8/0x3e0 [ 659.021642] ? __skb_clone+0x271/0x800 [ 659.025552] skb_ensure_writable+0x267/0x300 [ 659.029976] bpf_clone_redirect+0x12e/0x2f0 [ 659.034314] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 659.039087] ? SyS_bpf+0x749/0x38f3 [ 659.042734] bpf_prog_3aea14b1f6cd0d8b+0x52f/0x1000 [ 659.047787] ? trace_hardirqs_on+0x10/0x10 [ 659.052056] ? trace_hardirqs_on+0x10/0x10 [ 659.056582] ? bpf_test_run+0x44/0x330 [ 659.060487] ? find_held_lock+0x35/0x130 [ 659.064565] ? bpf_test_run+0x44/0x330 [ 659.068491] ? lock_acquire+0x16f/0x430 [ 659.072493] ? check_preemption_disabled+0x3c/0x250 [ 659.077548] ? bpf_test_run+0xa8/0x330 [ 659.081996] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 659.086785] ? bpf_test_init.isra.0+0xe0/0xe0 [ 659.091294] ? fput+0xd4/0x150 [ 659.094501] ? __bpf_prog_get+0x153/0x1a0 [ 659.098677] ? SyS_bpf+0x749/0x38f3 [ 659.102315] ? bpf_test_init.isra.0+0xe0/0xe0 [ 659.106826] ? bpf_prog_get+0x20/0x20 [ 659.110645] ? wait_for_completion+0x420/0x420 [ 659.115246] ? __sb_end_write+0xc1/0x100 [ 659.119417] ? fput+0xd4/0x150 [ 659.122622] ? SyS_write+0x15e/0x230 [ 659.126386] ? bpf_prog_get+0x20/0x20 [ 659.130220] ? do_syscall_64+0x1e8/0x640 [ 659.134406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 659.139306] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:04:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ff0700ff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000000085000000ed000000b70000000000800d2f5d21b370f10000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30f00000000000703000000fe15007b0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d5a0500000000006560b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000001900000703000000feffff7a0a9dfff8ffffff79a425e7e74593dd0600ffff8eff2d6405921671daa3a09fc19554c28a83000000000065040400010000000404000001007d60b7030000000000026a0a00fe00000000850000000d000000b70000000000000095006c64000000008eb318a4aa82444a7224eeda0000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3, 0x101000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000300)=0x8, 0x4) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x50000010}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x20, r2, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xe17}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x10) 12:04:18 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:18 executing program 4 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:18 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x800, 0x800) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000100)={@loopback, @broadcast, @multicast2}, &(0x7f0000000280)=0xc) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64055d000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) [ 659.350876] FAULT_INJECTION: forcing a failure. [ 659.350876] name failslab, interval 1, probability 0, space 0, times 0 [ 659.362558] CPU: 1 PID: 23429 Comm: syz-executor.4 Not tainted 4.14.133 #28 [ 659.369684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.379063] Call Trace: [ 659.381690] dump_stack+0x138/0x19c [ 659.385369] should_fail.cold+0x10f/0x159 [ 659.389562] should_failslab+0xdb/0x130 [ 659.393656] kmem_cache_alloc+0x47/0x780 [ 659.397748] ? lock_acquire+0x16f/0x430 [ 659.401753] ? check_preemption_disabled+0x3c/0x250 [ 659.406802] skb_clone+0x129/0x320 [ 659.411076] dev_queue_xmit_nit+0x296/0x8c0 [ 659.415465] ? sch_direct_xmit+0x7e/0x550 [ 659.419651] dev_hard_start_xmit+0xa7/0x8b0 [ 659.424091] sch_direct_xmit+0x27a/0x550 [ 659.428186] ? dev_watchdog+0x750/0x750 [ 659.432196] __dev_queue_xmit+0x1b6e/0x25e0 [ 659.436559] ? rcu_read_lock_sched_held+0x110/0x130 [ 659.441639] ? netdev_pick_tx+0x300/0x300 [ 659.445822] ? skb_release_data+0xff/0x700 [ 659.450072] ? skb_headers_offset_update+0x144/0x290 [ 659.455200] dev_queue_xmit+0x18/0x20 [ 659.459022] ? dev_queue_xmit+0x18/0x20 [ 659.463018] __bpf_redirect+0x62b/0xab0 [ 659.467013] ? skb_ensure_writable+0x243/0x300 [ 659.471620] bpf_clone_redirect+0x1fd/0x2f0 [ 659.476131] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 659.480898] ? SyS_bpf+0x749/0x38f3 [ 659.484552] bpf_prog_3aea14b1f6cd0d8b+0x382/0x1000 [ 659.489602] ? trace_hardirqs_on+0x10/0x10 [ 659.493864] ? trace_hardirqs_on+0x10/0x10 [ 659.498118] ? bpf_test_run+0x44/0x330 [ 659.502024] ? find_held_lock+0x35/0x130 [ 659.506099] ? bpf_test_run+0x44/0x330 [ 659.510016] ? lock_acquire+0x16f/0x430 [ 659.514013] ? check_preemption_disabled+0x3c/0x250 [ 659.519088] ? bpf_test_run+0xa8/0x330 [ 659.523009] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 659.527801] ? bpf_test_init.isra.0+0xe0/0xe0 [ 659.532316] ? fput+0xd4/0x150 [ 659.535542] ? __bpf_prog_get+0x153/0x1a0 [ 659.539807] ? SyS_bpf+0x749/0x38f3 [ 659.543456] ? bpf_test_init.isra.0+0xe0/0xe0 [ 659.547985] ? bpf_prog_get+0x20/0x20 [ 659.551808] ? wait_for_completion+0x420/0x420 [ 659.556405] ? __sb_end_write+0xc1/0x100 [ 659.560487] ? fput+0xd4/0x150 [ 659.563690] ? SyS_write+0x15e/0x230 [ 659.567446] ? bpf_prog_get+0x20/0x20 [ 659.571262] ? do_syscall_64+0x1e8/0x640 [ 659.575329] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 659.580195] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 659.612483] protocol 88fb is buggy, dev hsr_slave_0 [ 659.618572] protocol 88fb is buggy, dev hsr_slave_1 [ 659.670140] protocol 88fb is buggy, dev hsr_slave_0 [ 659.675298] protocol 88fb is buggy, dev hsr_slave_1 12:04:20 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000013d1006a0a00fe00000000850000000d000000b70000000000000095000000000000004a9008cb26dca3239e2c7a37b0934a8af1aa4eaf678b47b2af59c0afea9e260c07247f0de7698750789ca0a56fde90262ac1d0068a730f71f374bb817db7a99114aaddcb47b37b8301863479d35c48b20ec2da7849823ed03ccecacc1b7f5e665b7dc33a30c628fad11a779bb339fe38b08f84cce25932a21f98af0d313acd17ad061d4dd3db50a77ee5489010dafe525d8a6a463d93d14a59e5806bfbbea4a18202c463fac82148842d401169ee64c7f0dd8858684c8cbbfa1a6e76536beb923c4e12d751d33876"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101500, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000080)={0x0, @bt={0xfffffffffffff801, 0x5, 0x0, 0x2, 0x7fff, 0x3, 0x6, 0x80, 0x81, 0x6, 0x9, 0x8, 0x7f, 0x7fff, 0x10, 0xa}}) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000280)=0x5) 12:04:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x8940, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xde, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x5e}, @call={0x85, 0x0, 0x0, 0x3b}, @call={0x85, 0x0, 0x0, 0x68}]}, &(0x7f0000000080)='syzkaller\x00', 0xfffffffffffffffd, 0x45, &(0x7f00000000c0)=""/69, 0x41000, 0x3, [], 0x0, 0xd, r0, 0x8, &(0x7f00000002c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x5, 0xfffffffffffffff8, 0x9}, 0x10}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79d45f5b09000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x2, 0xffe00000000, 0x100000000, 0x7, 0x400}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000400)={r2, @in={{0x2, 0x4e23, @rand_addr=0x5}}}, &(0x7f0000000100)=0x84) 12:04:20 executing program 4 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:20 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 661.956951] FAULT_INJECTION: forcing a failure. [ 661.956951] name failslab, interval 1, probability 0, space 0, times 0 [ 661.956966] CPU: 1 PID: 23445 Comm: syz-executor.4 Not tainted 4.14.133 #28 [ 661.975419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.984870] Call Trace: [ 661.987478] dump_stack+0x138/0x19c [ 661.991130] should_fail.cold+0x10f/0x159 [ 661.995293] should_failslab+0xdb/0x130 [ 661.999277] kmem_cache_alloc+0x47/0x780 [ 662.003373] ? __this_cpu_preempt_check+0x1d/0x30 [ 662.008232] skb_clone+0x129/0x320 [ 662.011784] bpf_clone_redirect+0xa3/0x2f0 [ 662.016021] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 662.020803] ? SyS_bpf+0x749/0x38f3 [ 662.024467] bpf_prog_3aea14b1f6cd0d8b+0xdc9/0x1000 [ 662.029505] ? trace_hardirqs_on+0x10/0x10 [ 662.033758] ? trace_hardirqs_on+0x10/0x10 [ 662.038010] ? bpf_test_run+0x44/0x330 [ 662.041938] ? save_trace+0x290/0x290 [ 662.045763] ? bpf_test_run+0x44/0x330 [ 662.049674] ? bpf_test_run+0xc6/0x330 [ 662.053582] ? find_held_lock+0x35/0x130 [ 662.057667] ? bpf_test_run+0xc6/0x330 [ 662.061584] ? lock_acquire+0x16f/0x430 [ 662.065571] ? check_preemption_disabled+0x3c/0x250 [ 662.070632] ? bpf_test_run+0xa8/0x330 [ 662.074571] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 662.079355] ? bpf_test_init.isra.0+0xe0/0xe0 [ 662.083867] ? fput+0xd4/0x150 [ 662.087085] ? __bpf_prog_get+0x153/0x1a0 [ 662.091259] ? SyS_bpf+0x749/0x38f3 [ 662.094914] ? bpf_test_init.isra.0+0xe0/0xe0 [ 662.099569] ? bpf_prog_get+0x20/0x20 [ 662.103389] ? wait_for_completion+0x420/0x420 [ 662.107989] ? __sb_end_write+0xc1/0x100 [ 662.112073] ? fput+0xd4/0x150 [ 662.115282] ? SyS_write+0x15e/0x230 [ 662.119015] ? bpf_prog_get+0x20/0x20 [ 662.122838] ? do_syscall_64+0x1e8/0x640 [ 662.127079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 662.131949] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 662.141649] protocol 88fb is buggy, dev hsr_slave_0 [ 662.147810] protocol 88fb is buggy, dev hsr_slave_1 12:04:21 executing program 4 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:21 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x57, 0x0, &(0x7f0000000000)="b90500e6680d698cb89e40f00200", 0x0, 0x100}, 0x28) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x4, 0xb3b9f60, 0x4, 0x5, 0xfff, 0x7fff}) [ 662.271840] FAULT_INJECTION: forcing a failure. [ 662.271840] name failslab, interval 1, probability 0, space 0, times 0 [ 662.283509] CPU: 1 PID: 23458 Comm: syz-executor.4 Not tainted 4.14.133 #28 [ 662.290640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.300041] Call Trace: [ 662.302667] dump_stack+0x138/0x19c [ 662.306349] should_fail.cold+0x10f/0x159 [ 662.310535] should_failslab+0xdb/0x130 [ 662.314567] kmem_cache_alloc+0x47/0x780 [ 662.318673] ? __this_cpu_preempt_check+0x1d/0x30 [ 662.323542] skb_clone+0x129/0x320 [ 662.327206] bpf_clone_redirect+0xa3/0x2f0 [ 662.331459] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 662.336233] ? SyS_bpf+0x749/0x38f3 [ 662.339891] bpf_prog_3aea14b1f6cd0d8b+0xef3/0x1000 [ 662.344940] ? trace_hardirqs_on+0x10/0x10 [ 662.349207] ? trace_hardirqs_on+0x10/0x10 [ 662.353486] ? bpf_test_run+0x44/0x330 [ 662.357397] ? save_trace+0x290/0x290 [ 662.361487] ? bpf_test_run+0x44/0x330 [ 662.365400] ? bpf_test_run+0xc6/0x330 [ 662.369316] ? find_held_lock+0x35/0x130 [ 662.373417] ? bpf_test_run+0xc6/0x330 [ 662.377380] ? lock_acquire+0x16f/0x430 [ 662.381488] ? check_preemption_disabled+0x3c/0x250 [ 662.386552] ? bpf_test_run+0xa8/0x330 [ 662.390773] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 662.395569] ? bpf_test_init.isra.0+0xe0/0xe0 [ 662.400093] ? fput+0xd4/0x150 [ 662.403312] ? __bpf_prog_get+0x153/0x1a0 [ 662.407498] ? SyS_bpf+0x749/0x38f3 [ 662.411156] ? bpf_test_init.isra.0+0xe0/0xe0 [ 662.415699] ? bpf_prog_get+0x20/0x20 12:04:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000040)=""/239) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x0, 0x0) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f00000002c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xf, 0x4000000000000000, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 662.419529] ? wait_for_completion+0x420/0x420 [ 662.424220] ? __sb_end_write+0xc1/0x100 [ 662.428400] ? fput+0xd4/0x150 [ 662.431618] ? SyS_write+0x15e/0x230 [ 662.435453] ? bpf_prog_get+0x20/0x20 [ 662.439272] ? do_syscall_64+0x1e8/0x640 [ 662.443349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 662.448217] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:04:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000002c0)={0x400}, 0x4) write$capi20(r1, &(0x7f0000000080)={0x10, 0x9, 0x0, 0x83, 0x6, 0x4}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7fffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffff52d32d64050000000000650404a6062c52fe00010000000404000001007d60b7030000000100006a0a00fe00000000850000000d000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) fcntl$getflags(r2, 0x40b) sendfile(r2, r0, &(0x7f0000000400), 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r1, r2}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000280)=0x54) 12:04:21 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x9, 0x202001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='syzkaller\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000440)={'veth0_to_bridge\x00', @ifru_addrs=@xdp={0x2c, 0x4, 0x0, 0x3e}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x200000000000001b, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xe6, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffffffffffe}, 0x168, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xfffffffffffffd2f}, 0xf) syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x3a, 0x101000) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000480)=""/246) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0x1e, 0x0, &(0x7f0000000040)="b90703e6680d698cb89e40267f0f6ff9267718c949b79612d8f0eef02cea", 0x0, 0x100}, 0x343) 12:04:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000002a009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8000000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x204340, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x6010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x12c, r2, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x15}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xd0}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x21}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x12c}, 0x1, 0x0, 0x0, 0x20000040}, 0x20000800) [ 662.720974] protocol 88fb is buggy, dev hsr_slave_0 [ 662.726864] protocol 88fb is buggy, dev hsr_slave_1 12:04:24 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:24 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x6, 0x30, 0x3, 0xffffffff}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xee4, 0x4, 0x10001, 0x0, r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x39}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_CAPBSET_READ(0x17, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:24 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/173, 0xad}, {&(0x7f0000000280)=""/12, 0xc}, {&(0x7f00000002c0)=""/81, 0x51}, {&(0x7f0000000400)=""/215, 0xd7}], 0x4, &(0x7f0000000540)=""/41, 0x29}, 0x7ac}, {{&(0x7f0000000580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000600)=""/58, 0x3a}, {&(0x7f0000000640)=""/68, 0x44}, {&(0x7f00000006c0)=""/24, 0x18}, {&(0x7f0000000700)=""/167, 0xa7}, {&(0x7f00000007c0)=""/187, 0xbb}, {&(0x7f0000000880)=""/65, 0x41}], 0x6, &(0x7f0000000980)=""/53, 0x35}, 0x6}, {{&(0x7f00000009c0)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a40)=""/168, 0xa8}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/179, 0xb3}, {&(0x7f0000000c00)=""/41, 0x29}, {&(0x7f0000000c40)=""/129, 0x81}, {&(0x7f0000000d00)=""/160, 0xa0}, {&(0x7f0000000dc0)=""/12, 0xc}], 0x7, &(0x7f0000000e80)=""/173, 0xad}, 0x5}, {{&(0x7f0000000f40)=@ipx, 0x80, &(0x7f0000001140)=[{&(0x7f0000000fc0)=""/143, 0x8f}, {&(0x7f0000001080)=""/122, 0x7a}, {&(0x7f0000001100)=""/28, 0x1c}], 0x3, &(0x7f0000001180)=""/145, 0x91}}], 0x4, 0x10000, &(0x7f0000001340)) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001380)={r2, @broadcast, @loopback}, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000040)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:24 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x2, 0x31303553, 0x1, @stepwise={0x1, 0x0, 0x62fa, 0x2, 0x7c90, 0xbc32}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbff, 0x8200}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:24 executing program 4 (fault-call:2 fault-nth:7): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:24 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 665.018800] FAULT_INJECTION: forcing a failure. [ 665.018800] name failslab, interval 1, probability 0, space 0, times 0 [ 665.030564] CPU: 1 PID: 23487 Comm: syz-executor.4 Not tainted 4.14.133 #28 [ 665.037706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.047180] Call Trace: [ 665.049810] dump_stack+0x138/0x19c [ 665.053494] should_fail.cold+0x10f/0x159 [ 665.057690] should_failslab+0xdb/0x130 [ 665.061707] kmem_cache_alloc_node_trace+0x5a/0x770 [ 665.066758] ? is_bpf_text_address+0xa6/0x120 [ 665.071298] ? kernel_text_address+0x73/0xf0 [ 665.075732] ? __unwind_start+0x1f6/0x3d0 [ 665.079916] __kmalloc_node_track_caller+0x3d/0x80 [ 665.084880] __kmalloc_reserve.isra.0+0x40/0xe0 [ 665.089616] pskb_expand_head+0x116/0xc10 [ 665.093794] ? __lock_is_held+0xb6/0x140 [ 665.097915] ? iptunnel_handle_offloads+0x2f3/0x500 [ 665.103180] gre_tap_xmit+0x2f4/0x370 [ 665.107036] dev_hard_start_xmit+0x18c/0x8b0 [ 665.111495] sch_direct_xmit+0x27a/0x550 [ 665.115592] ? dev_watchdog+0x750/0x750 [ 665.119601] __dev_queue_xmit+0x1b6e/0x25e0 [ 665.123971] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.129025] ? netdev_pick_tx+0x300/0x300 [ 665.133205] ? skb_release_data+0xff/0x700 [ 665.137477] ? skb_headers_offset_update+0x144/0x290 [ 665.142658] dev_queue_xmit+0x18/0x20 [ 665.146494] ? dev_queue_xmit+0x18/0x20 [ 665.150502] __bpf_redirect+0x62b/0xab0 [ 665.154504] ? skb_ensure_writable+0x243/0x300 [ 665.159119] bpf_clone_redirect+0x1fd/0x2f0 [ 665.163467] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 665.168257] ? SyS_bpf+0x749/0x38f3 [ 665.171929] bpf_prog_3aea14b1f6cd0d8b+0x6bb/0x1000 [ 665.176991] ? trace_hardirqs_on+0x10/0x10 [ 665.181261] ? trace_hardirqs_on+0x10/0x10 [ 665.185527] ? bpf_test_run+0x44/0x330 [ 665.189440] ? save_trace+0x290/0x290 [ 665.193275] ? bpf_test_run+0x44/0x330 [ 665.197183] ? bpf_test_run+0xc6/0x330 [ 665.201099] ? find_held_lock+0x35/0x130 [ 665.205209] ? bpf_test_run+0xc6/0x330 [ 665.209133] ? lock_acquire+0x16f/0x430 [ 665.213134] ? check_preemption_disabled+0x3c/0x250 [ 665.218213] ? bpf_test_run+0xa8/0x330 [ 665.222137] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 665.226929] ? bpf_test_init.isra.0+0xe0/0xe0 [ 665.231450] ? fput+0xd4/0x150 [ 665.234934] ? __bpf_prog_get+0x153/0x1a0 [ 665.239146] ? SyS_bpf+0x749/0x38f3 [ 665.242907] ? bpf_test_init.isra.0+0xe0/0xe0 [ 665.247432] ? bpf_prog_get+0x20/0x20 [ 665.251365] ? wait_for_completion+0x420/0x420 [ 665.255977] ? __sb_end_write+0xc1/0x100 [ 665.260183] ? fput+0xd4/0x150 [ 665.263404] ? SyS_write+0x15e/0x230 [ 665.267157] ? bpf_prog_get+0x20/0x20 [ 665.271000] ? do_syscall_64+0x1e8/0x640 [ 665.275089] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 665.279972] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 665.292044] protocol 88fb is buggy, dev hsr_slave_0 [ 665.298422] protocol 88fb is buggy, dev hsr_slave_1 12:04:24 executing program 4 (fault-call:2 fault-nth:8): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="0100000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff7904f0ff00000000b7010000ffffffff2d64050000000000650404becf48800001000000006a0a00fe00000000850000000d000000b700000000000000950000001e1dd38dbda4ab08bf3da8069834bfe6ae6341c04cc197907badff2f1eeab378f1aae23d6265a5cbb049c41fff57254515647cf600b30fb440d19ce0bcd68ee57ba47e51c20e0407de7d2f9b61de59f85cdcbccda9d7cba5eea63faae9b441801f1420a3960b89654497f9b4a744eface99c87d71505246ce93002df"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f00000000c0)={0xffffffffffffff9f, 0x101, 0x2, 0x7, 0x9, 0x10001, 0x7, 0xc820, 0x7, 0x4, 0x80000001, 0x1, 0x0, 0x3, &(0x7f0000000400)=""/218, 0x2, 0x2, 0x6}) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000080)) 12:04:24 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x1000, &(0x7f00000009c0)=ANY=[]) [ 665.424807] FAULT_INJECTION: forcing a failure. [ 665.424807] name failslab, interval 1, probability 0, space 0, times 0 [ 665.436225] CPU: 1 PID: 23503 Comm: syz-executor.4 Not tainted 4.14.133 #28 [ 665.443363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.452744] Call Trace: [ 665.455377] dump_stack+0x138/0x19c [ 665.459044] should_fail.cold+0x10f/0x159 [ 665.463231] should_failslab+0xdb/0x130 [ 665.467324] kmem_cache_alloc+0x47/0x780 [ 665.471442] ? __this_cpu_preempt_check+0x1d/0x30 [ 665.476356] skb_clone+0x129/0x320 [ 665.479929] bpf_clone_redirect+0xa3/0x2f0 [ 665.484194] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 665.488989] ? SyS_bpf+0x749/0x38f3 [ 665.492662] bpf_prog_3aea14b1f6cd0d8b+0x978/0x1000 [ 665.497741] ? trace_hardirqs_on+0x10/0x10 [ 665.502022] ? trace_hardirqs_on+0x10/0x10 [ 665.506297] ? bpf_test_run+0x44/0x330 [ 665.510228] ? save_trace+0x290/0x290 [ 665.514054] ? bpf_test_run+0x44/0x330 [ 665.517973] ? bpf_test_run+0xc6/0x330 12:04:24 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b70600e4feffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000029500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x1b4, &(0x7f0000000100)="b90703e668f7788cb89e40f02cea", 0x0, 0xfe}, 0x28) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xfffffffffffffffa, 0x141100) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$RTC_UIE_OFF(r0, 0x7004) [ 665.521886] ? find_held_lock+0x35/0x130 [ 665.525973] ? bpf_test_run+0xc6/0x330 [ 665.529891] ? lock_acquire+0x16f/0x430 [ 665.533893] ? check_preemption_disabled+0x3c/0x250 [ 665.538945] ? bpf_test_run+0xa8/0x330 [ 665.542870] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 665.547842] ? bpf_test_init.isra.0+0xe0/0xe0 [ 665.552374] ? fput+0xd4/0x150 [ 665.555625] ? __bpf_prog_get+0x153/0x1a0 [ 665.559848] ? SyS_bpf+0x749/0x38f3 [ 665.563520] ? bpf_test_init.isra.0+0xe0/0xe0 [ 665.568045] ? bpf_prog_get+0x20/0x20 [ 665.571879] ? wait_for_completion+0x420/0x420 [ 665.576483] ? __sb_end_write+0xc1/0x100 [ 665.580578] ? fput+0xd4/0x150 [ 665.583793] ? SyS_write+0x15e/0x230 [ 665.587545] ? bpf_prog_get+0x20/0x20 [ 665.591468] ? do_syscall_64+0x1e8/0x640 [ 665.595562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 665.600543] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:04:24 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1f7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:24 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x20004) getrusage(0xffffffffffffffff, &(0x7f0000000400)) getpeername$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x21, 0xffffffffffffff15, &(0x7f0000000280)="ea23f668234bf0b5d3bba668f99cdbbf52035345d2d07998f894da8ffb7fb60514", 0x0, 0x102}, 0x28) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000640)) open_by_handle_at(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="9b00000006000000a77288fee33fde93d2ad9c5cf6d84c4dbe44a54b9450bf5a013ff098d0a759db016f90230cbf3fac8275139ac12450fbe574d8ea2c3fd9a703457b28d48dd5a4595d59ee62df579b0b7be9df7d64747ae56bd5816d944623facad2b22c58f514a512866b5a29e8a501a70000e654279dcf066859a65e9e81e89d2af828d612693c16addc3472657fec000000ff430617b39db9d1b535fbdfc427e98a0d1c0000"], 0x151280) r3 = add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000300)={r3, 0xe, 0xaf}, &(0x7f00000007c0)=ANY=[@ANYBLOB="656e633d726177c70606857e20e2f85d211c7e80b93232302d636500000000000600000000000000001d000000000000000000000000009966b503c24c0a00000000000000a05213a000"/88], &(0x7f00000006c0)="89517ed1428b2e4eb857af8eb7d0", &(0x7f0000000700)=""/175) getrusage(0xffffffffffffffff, &(0x7f00000004c0)) [ 665.831748] protocol 88fb is buggy, dev hsr_slave_0 [ 665.838166] protocol 88fb is buggy, dev hsr_slave_1 [ 665.910156] protocol 88fb is buggy, dev hsr_slave_0 [ 665.915326] protocol 88fb is buggy, dev hsr_slave_1 12:04:27 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'veth1\x00', 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:27 executing program 4 (fault-call:2 fault-nth:9): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000080000000010000000404000001007d60b7030000000000006a0a00fea5d30000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x7d, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0xf, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) dup2(r0, r1) 12:04:27 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, 0x0, 0x1000, &(0x7f00000009c0)=ANY=[]) [ 668.061151] FAULT_INJECTION: forcing a failure. [ 668.061151] name failslab, interval 1, probability 0, space 0, times 0 [ 668.072723] CPU: 1 PID: 23531 Comm: syz-executor.4 Not tainted 4.14.133 #28 [ 668.079896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.089377] Call Trace: [ 668.092002] dump_stack+0x138/0x19c [ 668.095662] should_fail.cold+0x10f/0x159 [ 668.099824] ? trace_hardirqs_on+0xd/0x10 [ 668.103995] should_failslab+0xdb/0x130 [ 668.108075] kmem_cache_alloc_node_trace+0x5a/0x770 [ 668.113111] ? save_trace+0x290/0x290 [ 668.116946] __kmalloc_node_track_caller+0x3d/0x80 [ 668.122108] __kmalloc_reserve.isra.0+0x40/0xe0 [ 668.126805] pskb_expand_head+0x116/0xc10 [ 668.130980] ? __copy_skb_header+0x2b8/0x3e0 [ 668.135400] ? __skb_clone+0x271/0x800 [ 668.139303] skb_ensure_writable+0x267/0x300 [ 668.143730] bpf_clone_redirect+0x12e/0x2f0 [ 668.148077] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 668.152843] ? SyS_bpf+0x749/0x38f3 [ 668.156495] bpf_prog_3aea14b1f6cd0d8b+0x895/0x1000 [ 668.161640] ? trace_hardirqs_on+0x10/0x10 [ 668.165905] ? trace_hardirqs_on+0x10/0x10 [ 668.170163] ? bpf_test_run+0x44/0x330 [ 668.174078] ? save_trace+0x290/0x290 [ 668.177908] ? bpf_test_run+0x44/0x330 [ 668.181816] ? bpf_test_run+0xc6/0x330 [ 668.185733] ? find_held_lock+0x35/0x130 [ 668.189811] ? bpf_test_run+0xc6/0x330 [ 668.193801] ? lock_acquire+0x16f/0x430 [ 668.197789] ? check_preemption_disabled+0x3c/0x250 [ 668.202857] ? bpf_test_run+0xa8/0x330 [ 668.206767] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 668.211544] ? bpf_test_init.isra.0+0xe0/0xe0 [ 668.216143] ? fput+0xd4/0x150 [ 668.219525] ? __bpf_prog_get+0x153/0x1a0 [ 668.223760] ? SyS_bpf+0x749/0x38f3 [ 668.227854] ? bpf_test_init.isra.0+0xe0/0xe0 [ 668.232364] ? bpf_prog_get+0x20/0x20 [ 668.236176] ? wait_for_completion+0x420/0x420 [ 668.240777] ? __sb_end_write+0xc1/0x100 [ 668.244994] ? fput+0xd4/0x150 [ 668.248208] ? SyS_write+0x15e/0x230 [ 668.251942] ? bpf_prog_get+0x20/0x20 [ 668.255760] ? do_syscall_64+0x1e8/0x640 12:04:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 668.259929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 668.264793] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:04:27 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002bc0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000400005d385bc514"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x36000, 0x0) ioctl$int_out(r1, 0x2, &(0x7f0000000380)) shmget(0x2, 0x2000, 0x78000400, &(0x7f0000ffd000/0x2000)=nil) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000001600)={0x5, &(0x7f0000000080)=""/150, &(0x7f0000001580)=[{0x7, 0x1000, 0x2, &(0x7f0000000400)=""/4096}, {0x2d3, 0x39, 0x7, &(0x7f0000000280)=""/57}, {0x9, 0x55, 0x3, &(0x7f00000002c0)=""/85}, {0xce, 0xc7, 0x6, &(0x7f0000001400)=""/199}, {0x3, 0x43, 0xeea, &(0x7f0000001500)=""/67}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000002b80)={0x8, &(0x7f0000001640)=""/164, &(0x7f0000002ac0)=[{0x7fffffff, 0x9d, 0x101, &(0x7f0000001700)=""/157}, {0x4, 0x27, 0x5, &(0x7f00000017c0)=""/39}, {0x100, 0x7, 0x9, &(0x7f0000001800)=""/7}, {0x7ff, 0x2f, 0x0, &(0x7f0000001840)=""/47}, {0x1f, 0x9e, 0x64f, &(0x7f0000001880)=""/158}, {0x4, 0xd1, 0x6, &(0x7f0000001940)=""/209}, {0x7, 0x7e, 0x81, &(0x7f0000001a40)=""/126}, {0x2, 0x1000, 0x8, &(0x7f0000001ac0)=""/4096}]}) 12:04:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000440)='syzkaller\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000080)=""/126, &(0x7f0000000100)=0x7e) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000400)=0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000280)={0x7, 0x7, 0x0, 'queue1\x00', 0x3}) 12:04:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x100000001, 0x2000000000000, 0x3, 0x6, 0x0, 0x2, 0x0, 0x8, 0x200, 0x2b, 0x7fff, 0x31, 0x3, 0x0, 0x40, 0x3e3c, 0x3, 0x56b82c3d, 0x4000000000000001, 0x6, 0x3, 0x212, 0x80000000, 0x2, 0x3, 0x8, 0x40, 0x7fff, 0x400, 0x8000, 0x100000000, 0x2, 0x3, 0x7ff, 0x7ff, 0x512c, 0x0, 0xf3, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x20c8, 0x0, 0x7, 0xeb9bd802356f82ed, 0x7, 0x3, 0x5}, 0x0, 0x9, r0, 0x1) [ 668.390145] protocol 88fb is buggy, dev hsr_slave_0 [ 668.395369] protocol 88fb is buggy, dev hsr_slave_1 12:04:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9db484560ab6fce6abffcecc1dc3ac7ed0ed2f17a94be00fa7deae3369564e50b8935f2bbffa304c8b6b6625d4ff491eda460d6c0a3e0c0670c29a1633d6778b45d28dd97aa3798d5140232b51fb431d0eec95c9cb958bc1ab1dc2caa21d723"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x12b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d4405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000003009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fsync(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000d31cec4e3b6e354e5473acad953c51e41cd4a61792f16bbe9555d7ef3248d03f29d1b6e60e7af8378e872ade9821637a161de35c404b1c1829f58d52266b6eb62899c36831e4bcd98f20"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x0, 0xc1, &(0x7f0000000100), &(0x7f0000000380)=""/193, 0x7}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xf3e, @bcast, @rose={'rose', 0x0}, 0x8, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000040000ffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60d7dbd72cb7030000000000006a0a00fe00000000850000000d080000b7000000000000009500000000000000486f7de8f4befdbdec27dd1f1f9cba0f58dbb4f9e537d3b6db5d7b94e94ac34bf9850c035dc1f26100"/156], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@ipv6_getmulticast={0x14, 0x3a, 0x1, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x20000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:28 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, 0x0, 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000400)=""/206, 0xce}], 0x1, &(0x7f0000000500)=""/4096, 0x1000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0xf, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@generic={0x8, 0xffffffff, 0x1, 0x7f, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x69, &(0x7f00000000c0)=""/105, 0x41100, 0x0, [], r1, 0x1f, 0xffffffffffffff9c, 0x8, &(0x7f0000001540)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001580)={0x1, 0x10, 0x1, 0x200}, 0x10}, 0x70) 12:04:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000fe7fff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000173a47800cb450404000001007d60b7030000000000106a0a00fe0000f1ff850000000d000010b7000000000000009500004d0b3a5b0000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 669.110168] protocol 88fb is buggy, dev hsr_slave_0 [ 669.115359] protocol 88fb is buggy, dev hsr_slave_1 12:04:30 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000100)=0xe8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, r1, 0x8, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, 0x8, 0x10, &(0x7f0000000040)={0x3}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:30 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, r1, 0x0, 0xf0f90cf1e2c348ba}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8000, 0x210000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000406a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xfffffffffffffd7f, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0}, 0x28) 12:04:30 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, 0x0, 0x1000, &(0x7f00000009c0)=ANY=[]) 12:04:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0xfe33, &(0x7f0000000080)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) finit_module(r0, &(0x7f0000000040)='\x00', 0x2) 12:04:30 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vsock\x00', 0x8600, 0x0) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2d, 'pids'}, {0x2b, 'rdma'}, {0x2d, 'rdma'}, {0x2d, 'io'}, {0x2d, 'memory'}]}, 0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x2, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000700)) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000080)={0x7, {0x4, 0x3, 0x3f, 0x7}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SG_IO(r1, 0x2285, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0xdc, 0x4c7c, @buffer={0x0, 0x80, &(0x7f00000000c0)=""/128}, &(0x7f0000000400)="602667f26831d061418a2cfcf64d65f92c0fad9d7ee7188b6bc48742b1a38c879ae04e9fe5af9ad058295ea7324e673f66b8e01c4e602fc240a6dd387c5fd038fbdb946ed14249f865de071f2f4e7e5f75d40e5b42b396b66617ca38b52bf0c868280d43056cf081f5ebe974c68a678396687836ff40d3605392fbe83c4ff175bb95608e62b3a1278923de2cba1b9689b18e71de1096fb72882438fe675403550b53ca13ea12667a4158c5c04693d3bfcb29e8c4833af932f1806ab21b962a3b242d53204351fa3941e26ea423fe510edd8712af026d2c85e4cb6fa8", &(0x7f0000000500)=""/199, 0x6, 0x10, 0x1, &(0x7f0000000280)}) write$FUSE_LSEEK(r0, &(0x7f00000006c0)={0x18, 0x0, 0x4, {0x4}}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:30 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0xab, 0x5b}]}, 0xc, 0x2) [ 671.510136] protocol 88fb is buggy, dev hsr_slave_0 [ 671.515333] protocol 88fb is buggy, dev hsr_slave_1 12:04:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) ptrace$getregset(0x4204, r3, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=""/158, 0x9e}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0xfffffffffffffdc3, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x1}, 0x28) 12:04:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x3ff, 0x100) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000200)={{0x1, 0x3, 0x2, 0x1, 0x6}, 0x7, 0x401, 0x31b}) dup(r1) getdents(r2, &(0x7f0000000280)=""/88, 0x58) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000000)={0x0, 0x40}, 0x8, 0x10, &(0x7f0000000000)={0x1, 0x0, 0x7, 0x3}, 0x10}, 0x193) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/netfilter\x00') ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 672.070229] protocol 88fb is buggy, dev hsr_slave_0 [ 672.075427] protocol 88fb is buggy, dev hsr_slave_1 12:04:33 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) mq_unlink(&(0x7f00000000c0)='syzkaller\x00') r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0xfffc, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:33 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000000c0)={0x7f, @rand_addr=0x7, 0x4e24, 0x1, 'fo\x00', 0x1, 0x2, 0x7e}, 0x2c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x103000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'ifb0\x00', @dev={[], 0x1e}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000e2a92e173b0a3b69ffffffff2d640500000000006504040001000000040400000000006a0a00fe00000000850000000d000000b7400000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:33 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[]) [ 674.465982] IPVS: set_ctl: invalid protocol: 127 0.0.0.7:20004 12:04:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000dda30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 674.630132] protocol 88fb is buggy, dev hsr_slave_0 [ 674.635360] protocol 88fb is buggy, dev hsr_slave_1 12:04:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000400)="c04d635f47655044786aef794865daa52ec7c0d03ed15113a7377fb4323df15509ea91702f8687c642c9d658cdc16bdf3528ecdca92cc98116b8b7b734c0d7257c8e60c98cf55b388fa20e699d4946772697502cefad3ce727ec069cac5fe5e55859ccb469257a9331dfc517b8c913104616770db6bd689c9b3d86550402c60e69ff9d4928332bab83c75cec14d007c7444b0544ea8b1bf108350dc1fac9c50b633736aff65776cf2db2c5c52912497fb444bf7602260358be714e4b8055a64b8bd735bb52a5cf6fa8b90a7e", 0xcc, 0xfffffffffffffffb) r1 = dup(r0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040)=0x10000, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_bt_hci(r1, 0x0, &(0x7f0000000080)="79c3adc76a2b839cd9b5cef5e0d5df4950185e2c4283973e0c64752d76aa88de37ce63b83bd423c52b0f37dac86a5476d0c8b15fa9f944ffa18163db92b906d5eab65825693b8496dda9783bc5eec5e85e83b1a0d1dc8ac57748aed40b13dddea9b8b445e0f404223448912ddf12df8fb01ae80e3d2d207fe41d0d7038ce181ec5d94946b76cbd408c86495cfaa423d098c3ad33826b7aa7abceb9291032e00926efcacdcb92a278a1eab32e5750be74afa3520ddafdf1e7cb7f61cc48729a") setns(r0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) ioprio_set$pid(0x1, r0, 0x7) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x40) nanosleep(&(0x7f0000000140)={0x77359400}, &(0x7f0000000200)) accept4$packet(r1, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001940)=0x14, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x2000000000000092, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200f503000000bfa30000000000000703000000beffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkalldr\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], r4, 0x0, r3, 0x8, &(0x7f0000000000)={0x5, 0x100000}, 0xffffffffffffffc7, 0x10, &(0x7f0000000000)={0xfffffffffffffffd, 0x2, 0x432, 0x6}, 0x10}, 0x70) 12:04:34 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x3fe) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r4, 0x4}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x8, 0xfffffffffffffe48, &(0x7f0000000000)="b90703e6680c698cb89e40112dea", 0x0, 0x3}, 0xffffff7b) 12:04:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000080)={0x833, 0x3ef4, 0x400, 0x7, 0x1, 0x8001}) [ 675.200989] protocol 88fb is buggy, dev hsr_slave_0 [ 675.207136] protocol 88fb is buggy, dev hsr_slave_1 12:04:36 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b70200000900000000000000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000000155ef7630a000d000000b700000000000000950000000000000000000000000000000065dcd537793b20193b415f70f724013d1cc5a9272bbfdbb95b809ee40dfece98"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1800000000000060, 0x3, 0x0, &(0x7f0000000080)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000100)={0x4, 0x40, 0x8, 0x6, 0x8, 0x2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0ea4d16df3a32909eab2a79727ce4a749fff8ffffff79a4f0ff00000000b7060000fff2ffff2d6405000000000065040400010000000400000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d558cb89e40f02cea", 0x0, 0xfd}, 0x28) 12:04:36 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[]) 12:04:36 executing program 0: clone(0x1000000, &(0x7f0000000040)="50dd2d4c9cdf085d0ed234594521fbdcb45cfea9583f6b0bb05ccf9b", &(0x7f0000000100), &(0x7f0000000280), &(0x7f0000001400)="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") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) tgkill(r0, r1, 0x31) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$packet(r2, &(0x7f0000000400)=""/4096, 0x1000, 0x12040, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) fstat(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) r6 = getgid() r7 = getegid() getgroups(0x8, &(0x7f0000000780)=[r0, r1, r2, r3, r4, r5, r6, r7]) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa300000000000007030000f5d9ffff7a0af0fff8ffffff79a4f0ff00ffffff2d6405000000000065040400010001000000000000000360b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r9 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$RDS_RECVERR(r9, 0x114, 0x5, &(0x7f00000000c0), 0x4) getsockopt(r9, 0x0, 0x9, &(0x7f0000000400)=""/211, &(0x7f0000000080)=0xd3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r8, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:36 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) seccomp(0x0, 0x1, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x4, 0x8, 0x8, 0x6}, {0x302, 0x401, 0x1, 0x101}, {0x1, 0xffffffffffffffeb, 0x9f08, 0x5}, {0x3, 0x0, 0xfffffffffffeffff, 0x200}, {0x3ff, 0x432a, 0x1, 0x2}, {0x10001, 0xc608, 0xff, 0x7}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa3000000005b700703000000feffff7a0af0fff8fff4ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:36 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x800, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x4000, 0x0) r2 = getpgrp(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x0, 0x6, 0x4, 0xaf30, 'syz1\x00', 0xdc3}, 0x5, 0x100, 0x5, r2, 0x1, 0x2, 'syz0\x00', &(0x7f0000000400)=['^{system\x00'], 0x9, [], [0xffff, 0x100, 0x5, 0xdf49]}) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850040000d000000b70000000000000095000000000000006d4db93cd6b078f455eacac0e1bcf2c1f1d40e464f28ffe0406c281101b9ac753220775b503740707755847017ec731b0bf8531ad1d1bc340dcaf13ed37154d8232a7e084965b69d596e9b273a1b3cbebe10899091aed7d6f8608f48e8a31d5909177d55a92f71d6dfb3aa932dbccf72560978b95a5e60100a470861a328c4f43dec01c46fcb"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x1, 0x2, 0x5, 0x800, 0x0, 0x6, 0x204b, 0x2, 0x6, 0x7, 0x0, 0x2, 0x2, 0xbcb, 0x7fffffff, 0x2, 0x2, 0xe8f, 0x2, 0x4, 0x6, 0x100000001, 0xffffffffffffffff, 0xa048, 0x2, 0x5, 0x1, 0x6, 0x0, 0x401, 0x65a, 0x3, 0x9, 0xfffffffffffffffa, 0x8, 0x6b1, 0x0, 0x34, 0x0, @perf_config_ext={0x1, 0x9}, 0x28082, 0x80, 0x5, 0x4, 0x4, 0x877, 0x2}, 0x0, 0x1, 0xffffffffffffff9c, 0x0) [ 677.751827] protocol 88fb is buggy, dev hsr_slave_0 [ 677.758318] protocol 88fb is buggy, dev hsr_slave_1 12:04:36 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x101000, 0x0) fcntl$setflags(r0, 0x2, 0x1) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:39 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x37c) 12:04:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffffa7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1f, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b70600edfeffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000400)={0x15, 0x110, 0xfa00, {r2, 0x7, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e22, 0x3, @local, 0x8}}}, 0x118) r3 = msgget$private(0x0, 0x1) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000640)=""/49) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xa, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x400100}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xfe, 0x75, &(0x7f0000000540)="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", &(0x7f0000000280)=""/117, 0x4}, 0x28) 12:04:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000300)={@loopback, 0x1, r1}) socket$rxrpc(0x21, 0x2, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000280)={0x7, 0x0, 0x2, {0x81, 0x5, 0xfffffffffffffffd, 0xff}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0xfffffffffffffecc) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x410040, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000080)={0x9, 0x0, {0xffffffffffffffff, 0x2, 0x8, 0x0, 0x100000000}}) 12:04:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4480, 0x0) sendto$x25(r1, &(0x7f0000000400)="5017b49cec41830098505b21d2925cfadaf3affa16b4f86517aebb451e3115175312ab772a0d8dc5aa111c32da59956d076e85bcee6ccc95daa591b2b8c17e71294c51de06dc734eab15fe4aa3beeb9fcb1a287145e470edafba820ef8dcad7d834ccbe5ee3868ef8571960aea2b1184facaa62a290ccceaefb9c63643f16b56f4bb41f699c42f27aa5d87ef0190ed76c737129d6374effbfe8169defa74f0aefe5e3dc81b97bdc0e6ce18b850a482e11563ba7482190402d723d574a20b036d115a9fed20f6e009616964989960bc14fe6cc44e45f8b5cc1f1df8f656feac935c10eedaaa81", 0xe6, 0x1, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:39 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[]) 12:04:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80080001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r2 = creat(&(0x7f00000005c0)='./file0\x00', 0x10) r3 = syz_open_dev$usb(&(0x7f0000000540)='/dev/bus/usb/00#/00#\x00', 0x4, 0x101000) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000580)) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000440)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000019c0)={0x15, 0x110, 0xfa00, {r6, 0x8, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x4e641d27, @mcast2, 0x100}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x118) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000740)='dns_resolver\x00', &(0x7f00000006c0)=@keyring={'key_or_keyring:', r5}) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8002008}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x24, r7, 0x0, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x24008840) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0xc32, 0x6, 0x6b9, 0x8, r0, 0x7, [], r1, r4, 0x3, 0x3}, 0x3c) ioctl$EVIOCGKEYCODE_V2(r4, 0x80284504, &(0x7f00000009c0)=""/4096) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x104, 0x0, &(0x7f0000000040)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) pwrite64(r8, &(0x7f0000000780)="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", 0x225, 0x0) 12:04:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4840, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000400)={"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"}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:39 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 680.683749] audit: type=1400 audit(1563537879.725:128): avc: denied { create } for pid=23745 comm="syz-executor.4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 12:04:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:39 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:39 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000008d000000b7000000000000009500000000000000c3cfe023521bff9b9d6da31a7dd48493c93a606779ff3add7a1fca9e158a1d0cf00d6976546fc8fa0def56d6846812de5331b05c61d465d8ac03"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r1, &(0x7f0000000280)="4f43ea1753b13d744e2cb033546298ed0b5b55fbd15308f91322d26f5008e1302d204bf625639e8f87f03943fcc872ec81fc7c456297e37b07cc64c5a238084edd32f83aefc42951732489a639b3824c6d592426fe8d0c3f04a001d6c5d2c29ae82b06f8796b4fc08901609239747cc452", &(0x7f0000000380)=""/128}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:39 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 680.870712] protocol 88fb is buggy, dev hsr_slave_0 [ 680.876950] protocol 88fb is buggy, dev hsr_slave_1 12:04:40 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x400, 0x120) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() r5 = getuid() r6 = getegid() getresuid(&(0x7f0000000680), &(0x7f0000000a80)=0x0, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00)={0x0, 0x0, 0x0}, &(0x7f0000000b40)=0xc) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000b80)={0x2c8, 0x0, 0x3, [{{0x5, 0x3, 0x3, 0x100, 0x1, 0x1c2b, {0x6, 0x1b, 0xf32, 0x2, 0xac74, 0x1e, 0x800, 0x9, 0x8c8, 0xffff, 0x100000001, r1, r2, 0x1f, 0x3}}, {0x0, 0x7, 0xb, 0x9, '/dev/mixer\x00'}}, {{0x2, 0x3, 0x9, 0x7f, 0x800, 0x7edf5c42, {0x5, 0x64538bd4, 0x5, 0x0, 0x10001, 0x6, 0x7, 0x1, 0x10000, 0x8, 0x1, r3, r4, 0xab1, 0x78fe}}, {0x3, 0xbc, 0x11, 0x0, 'vboxnet0.security'}}, {{0x6, 0x3, 0xff, 0x7, 0xa0, 0x2, {0x4, 0x7, 0xfffffffffffffffc, 0x6a2, 0x3, 0x5, 0x3, 0x1, 0x7b, 0x8000, 0x7, r5, r6, 0x0, 0x9}}, {0x4, 0x7ff, 0xa, 0x5, 'syzkaller\x00'}}, {{0x1, 0x1, 0x7, 0x9, 0x7fff, 0x101, {0x6, 0x7, 0x3e6, 0x1, 0x10001, 0x6, 0x101, 0x2, 0xb3, 0x73e5e031, 0x7, r7, r8, 0x7, 0x9}}, {0x6, 0x8, 0x19, 0x200, '/selinux/avc/cache_stats\x00'}}]}, 0x2c8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r9, 0x84, 0xb, &(0x7f0000000300)={0x1, 0x81, 0x7, 0x1, 0x40, 0x273, 0x8, 0xc2, 0x9, 0x5, 0x2}, 0xb) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000e30c000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r10, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) preadv(r10, &(0x7f0000000a00)=[{&(0x7f0000000380)=""/226, 0xe2}, {&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000040)=""/103, 0xffffffffffffffc9}, {&(0x7f0000000800)=""/67, 0x43}, {&(0x7f0000000900)=""/249, 0xf9}], 0x5, 0x1d) r11 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r11, 0x84, 0x21, &(0x7f0000000700), &(0x7f0000000740)=0x4) 12:04:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b70200000400002e2100000000000f000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000858003000000000000000000000000000400000000000000c11c35fd4da673bbbff583b4f20000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:40 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x1000, 0x0) 12:04:40 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x7fff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000180)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400ffff00000404001101d0f6d1db1e3ea06ee64ef490795158007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x10000, 0x0) r2 = gettid() ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000100)={0x8, "6b657aa15ac9028d23ba7b00000002714590df3f51f3f05e290ee500", 0x2, 0x398, 0xfffffffffffffff9, 0x20, 0x6}) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x4, 0x412aaf91}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000fef27b5972cbb3ffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500"], &(0x7f0000000340)='syzkaller\x00', 0x2, 0x199, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x358, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x4}, 0x28) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x7fff, 0xfffffffffffff801, 0x8, 0x1f, 0x0, 0x9, 0x6, 0x200, 0x8, 0x8, 0x100000000, 0x7, 0xc, 0x10001, 0x3f], 0x0, 0x100}) 12:04:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x6, 0xffffffffffffff5c, &(0x7f0000000000)='\x00\x00\a\x00\x00\x00', 0x0, 0x100}, 0xfffffffffffffea2) 12:04:40 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 12:04:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b70600001affffff2d6405000017ea10967d7edc00000065040400010000000404000001007d60b7030000000000006a0a00fe28325a9f850000000d000000b70000000000000095eb5d223ab01babc537306a4cdc28bb6ff0ef0fdd9def97f1541670c3586d15dbf23ca51cf1c872f700000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b706000002f0dd83f4f60c6a0000000065040400010000000404000001007d60b7030000000000016a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000280)="eb846a297cb89f03f9f55548b2472b52160a3ab3677d2da5081423bf09d73a41041744c7869a2b8a7457a2d48144bbb6e3eb86ff80e0b0f8aa7c3d0983fa3c509d924130d73d84dda6ac3cd40efbee1c4c3345d54ca77d", 0x57, 0xfffffffffffffffa) r2 = request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='ppp0\x00', 0xffffffffffffffff) r3 = add_key(&(0x7f0000000480)='rxrpc\x00', &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000500)="eb886e6b62865448f9ee0c9a1a766173d86861323ddc1e8f8313ff4c56156c3cbcb18d583ddc0ea8c85284760756fab5827b284f3315c1f6eb7d779e17", 0x3d, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000540)={r1, r2, r3}, &(0x7f0000000580)=""/4096, 0x1000, &(0x7f00000016c0)={&(0x7f0000001580)={'crc32c\x00'}, &(0x7f00000015c0)="1377741626ab0e0bd7c098f9ea4b9bfba349053e9faec73959a093f460d06c3ff0df8ef1104fa846bd8b7d0a562d23f39714e185702c381dbab9ca23dae5b9a9cd46c1f728df8c2ec9b2a9fd4bd12aa97c9bb93aa870913d7bf52e98077402db7f32adfb82775c4b3af206883ad05e31895e20bd7334d551cf357b2415e2b7b2bbc33fdec14de0a9a52e874eeb3d1bf360eedfb8b25efa7af3051c143c7e96f39243a50e0dc7683e5d6ec090ee82e0be96a007e5097fffe999cae45b3cdd219281980de259498aa126c32f48e39c146cce6da6e7a151e0d270ee9344bb3bbd1f6b26d2d8e1a0964024e4956e51b9aea639fa49796cf1dbafb73cc1", 0xfb}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x80000) syz_init_net_socket$llc(0x1a, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x10000000000002) mkdirat(r4, &(0x7f0000000080)='./file0\x00', 0x0) 12:04:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:40 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 681.590175] protocol 88fb is buggy, dev hsr_slave_0 [ 681.595769] protocol 88fb is buggy, dev hsr_slave_1 12:04:40 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 681.910179] protocol 88fb is buggy, dev hsr_slave_0 [ 681.915888] protocol 88fb is buggy, dev hsr_slave_1 12:04:41 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x1000, 0x0) 12:04:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa3130000000000f53c4b19478eba0703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:41 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x444100, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x28000, 0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feff727fb069e9ff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6097030000000000006a0a00fe00000000850000000d000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:41 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) read(r0, &(0x7f0000000040)=""/109, 0x6d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000280)={0x0, 0x7530}, 0x10) mq_timedsend(r1, &(0x7f0000000080)="f261e7d5ac85376049d5d8bf5c71831d686340a284114607e58f178eadba67e8441cb9e60ac6bde4a3acb516004df2be53180baeda161039df7c4e951db9c973a62facdb94785438883979408829e739e55376cce751e55061f9729c86864d50e54e198aab2441f7072fc6bf7dc0347f43eb2c75b37496", 0x77, 0x1005, &(0x7f0000000300)={r2, r3+10000000}) 12:04:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa300000000d6ca0703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000080)="30b33e5b37420db30e92071842f6b98c931073a04aa402f7") 12:04:41 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe02000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000000c0)={0x5, &(0x7f0000000400)=[{}, {}, {}, {}, {}]}) 12:04:41 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x12000, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20\x00', 0x420000, 0x0) mkdirat(r0, &(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000600}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getnetconf={0x14, 0x52, 0x308, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x20004001) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:41 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff0000f306b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001b05a24591fcc15209157e55acbeb07c7444e0204b20b0b22cf9d65e14760840397d8fc62a933dae078ad5e6a291fa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:41 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400001, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000000c0)=ANY=[@ANYBLOB="09000065f983e521a75bdf5d8bee041471b9d388c6902db935f79993db"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 682.471603] protocol 88fb is buggy, dev hsr_slave_0 [ 682.479412] protocol 88fb is buggy, dev hsr_slave_1 12:04:41 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x1000, 0x0) 12:04:41 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 12:04:41 executing program 4: unshare(0x800) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x80, 0x1c2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x100000001, 0x4, 0x186ebe60, 0x5, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000400)={r2, 0x60, 0x30, 0xa238, 0x7}, &(0x7f0000000440)=0x18) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000480)="7a2e72abe221fd37b2aa5849c2363bf97fe34505aad4c4881d7a80ee4e1214ddf70eefa2ba144ca77d371d698f22f9bc9bb74bfb8a40d8f212bb0c11e1938f8a7f40fcb75d1619263c205c691e392397aa2a1b25250ffb2fbaeb5512784dd7fdf00cfbdd550b324151d312fd8db25baed353c452acff9bac2ebe23c3ce96593c41a4dc60a28fee72730e7ec963048539bf549f75f54d23eb872d8d30868f0747823dc0b45232439e12027d369467b12478d2c2a378da0dbbdff8693082e1b7cd3be64837992ade") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000b327009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000680)={0x0, 0x4, 0xffff, 0x6}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000700)={0x1, [0x0]}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e24, 0xf147, @remote, 0xfed5}}}, &(0x7f0000000840)=0x84) sendmsg$inet_sctp(r2, &(0x7f00000009c0)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x1b, @ipv4={[], [], @multicast1}, 0x3cf}, 0x1c, &(0x7f0000000600)=[{&(0x7f00000000c0)}, {&(0x7f0000000280)="11b5629e57f8767866b2a591c37dd03e8939074417ca9c82cfea677aa6a1b4941ad059b9a77e680dffbf7d6aabdf1da37adbec3afc0ffc43d750fb038afd4d856283b18e79a622c261e6293aaf2bbf93bc0c07c432735a6570c2366287af0b72c7b5b3dbd4f3a68a1f86c9264f3518988ca5148892cc56fff1ce1f22c8b19c94e4", 0x81}, {&(0x7f0000000400)="2ab006bbabe935d8f44fdedd36997645d6da458b4db2a4efa797a847ce17731a99546864c2490777f2870c3572a13883f49677723d795faace2ea10059e5d65faa322d127bcd", 0x46}, {&(0x7f0000000480)="b55efb435996be2e5f91964de3c74dc5fb0a7955e353fc3a5a5cf560c41e71fd16c5fc7dafd387d73962770922bb3b24d605c1799a8a4ea66cd27be6ffc23d10f7575fc5a707dbde1e7239f0ef7d49e471b5", 0x52}, {&(0x7f0000000100)="52f5fa332601eb95efdba04c19a6f502a5053ededfb2e2d77ed9dc2ffc8506ba7d714c4216", 0x25}, {&(0x7f0000000500)="dfa8bdf1e691a11c69bc54378ac66f16fc2988a2ea12abc8bbe2da43ad3ae2bf58541c5023b1a174904753282c2ec499c6524f376ffdeb0271fcd9771cb7f8646aa6a8150182e2fe8da06a6ba80eea71a8b39928ce21c9620f29b96c3350710bb772e6b5a4e97990e764e9009f798bde95ce7d3074c4290453fb778a23adf8ff84fc47f64e55b0a75abb4548e520f1541528fa1efd1ec607bd60471ec0bf77ce9aded92ca9e16d0b13cfe04480cc64b3847ceb4394a26fe2a957109ec98f303f1954cf0086f2850e075033c8142d5a438ab1422468113321f252bb3694a84387a95d048c319747c7cef8a859619f9a", 0xef}], 0x6, &(0x7f0000000880)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x9}}, @sndrcv={0x30, 0x84, 0x1, {0x6801, 0x1428, 0x8, 0x2, 0x7fffffff, 0x7, 0x2, 0x1ff, r3}}, @init={0x18, 0x84, 0x0, {0x2208, 0x8000, 0x0, 0x2d}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @sndinfo={0x20, 0x84, 0x2, {0x843, 0x2, 0xff, 0x80, r4}}, @init={0x18, 0x84, 0x0, {0x8000, 0x6, 0x225, 0x40}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0xf50c, 0x9, 0x10000, 0x3ff, 0x7, 0x8, 0x0, r5}}, @dstaddrv6={0x20, 0x84, 0x8, @empty}], 0x138, 0x40800}, 0x4000000) 12:04:41 executing program 1: getpgrp(0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tee(r0, r0, 0x6, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000d020cad81863cc44590b0857879ae7b146f3ad85f7b9dc06d9f8f10d304a6636e524ef327d8ff1731c164462ad066912d4cd818b8fa0781e8981c2be97529fd45a38c6b195a1a06708e5599ce5acbe948cc244e29448b2633ff2081438f272ed554d226a8cd90a954a24579a58321c689e93282c870745e0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 682.950971] net_ratelimit: 2 callbacks suppressed [ 682.951046] protocol 88fb is buggy, dev hsr_slave_0 [ 682.964027] protocol 88fb is buggy, dev hsr_slave_1 12:04:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000007000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405001000000065048000010004040000937d60b7030000000000406a0a00fe00000000850000000d000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x5) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:42 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3c773d1c, 0x400) dup3(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:42 executing program 0: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='syzkaller\x00', 0xa, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000280)='#\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 683.510204] protocol 88fb is buggy, dev hsr_slave_0 [ 683.515566] protocol 88fb is buggy, dev hsr_slave_1 12:04:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0xfffffffffffffe6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xfffffddd}, 0x48) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x10000, 0x0) recvfrom$unix(r1, &(0x7f0000000400)=""/215, 0xd7, 0x2000, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e24}, 0x6e) timer_create(0x7, &(0x7f0000000300)={0x0, 0x1f, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000500)=0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000580)={{}, {r3, r4+30000000}}, &(0x7f00000005c0)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000280)={@mcast2, 0xffffffffffffff01, 0x0, 0x3, 0x8, 0xffffffff, 0xead9}, &(0x7f00000002c0)=0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xffffffffffffff9c, 0x0, &(0x7f00000000c0)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0xb9) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 12:04:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000004d7fdf7228000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x800000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={r2, 0x3c, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x4, @ipv4={[], [], @remote}, 0x7}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}, @in={0x2, 0x4e22, @rand_addr=0x5}]}, &(0x7f00000002c0)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040007006a0a00fe00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 12:04:42 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x1000, 0x0) 12:04:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040a00fe00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0xfe57) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0x2, &(0x7f0000000100)=0x2) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000040)=0xf800000000, &(0x7f0000000080)=0x2) [ 684.006462] protocol 88fb is buggy, dev hsr_slave_0 [ 684.012962] protocol 88fb is buggy, dev hsr_slave_1 12:04:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004d8fba30000000000000703000000feffff7a0af0fff8ffffff79f8f9457143e9b891ab9ad44f43a4f0ff00000000b7060000fff8ffff2d6405000700000000000000010000000404000001007d60b7ef5c2e03f4ba8b910a00fe00000000850000000d000000fdea8aea00000000950000008c5116fc1975f8f7ad75f57c43701d1d3bbbd828a890a8729d40de20dcb6357dd795b6d6c7a8f6db5749f861133a0be4c402ff6d251beb890e6a0c365ac06a4912c74f9454960fa131fc6a9a9fc6d1d876a5a977c412fbae1a9c127dd61fe966d695586479374fb7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x3, 0x1000000, 0x6, 0x3ff, 0x8001, 0x0, 0x8, {0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x6f, 0x3f, 0xc3, 0x8, 0x10001}}, &(0x7f0000000280)=0xb0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000380)='bond_slave_1\x00') getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r2, 0x9}, &(0x7f0000000300)=0x8) 12:04:44 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0xc0000) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x1c) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0) ioctl$TCGETX(r2, 0x5432, &(0x7f0000000380)) rt_sigqueueinfo(r3, 0x3f, &(0x7f0000000280)={0x1e, 0xba, 0x7f}) 12:04:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101a00) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000280)={0x2, 0x3, 0x6, 0x0, 0xf}) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000000c0)={0x0, 0x200, 0x81, 0x9, 0x2, 0x20, 0x7, 0x1ff, 0x3a, 0x80000000, 0x8, 0x9}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x10201, 0x3, 0x100000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) 12:04:44 executing program 3: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=@fragment={0x0, 0x0, 0x3ff, 0xbcd9, 0x0, 0x97f6, 0x67}, 0x8) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000600)={0xed1, 0x0, 0x0, 0x1, 0x7fff, "44c8ceba355267b9931fe8c1805267ae816394"}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340)={0x3}, 0x1) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44ef320372445f324", 0x80, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="b1b7b8a2ac65a2606a259eb115364592de3712a5734da67c9296d12feca431d82a605a233e8ed1defbf98dd7c800f4de82f38d7753a30105e7f9e2d0073659bad9f30075f73f7be39524d4621da8a774f56032cdfa084595fc09b9ea3a590525f044586cd779a19d28fa8981abfcfc13cdc94dfbe79c213f5656a92e1ef1579d", 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @rand_addr="88932647f31c41a310433d6a51d8df74"}}, 0x0, 0x401}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfdb3) getegid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) mount$fuse(0x0, 0x0, &(0x7f0000000680)='fuse\x00', 0x1000, 0x0) 12:04:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x200000000000009f, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffff0000a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 686.070175] protocol 88fb is buggy, dev hsr_slave_0 [ 686.077349] protocol 88fb is buggy, dev hsr_slave_1 12:04:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) 12:04:45 executing program 2: r0 = perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x3ff, 0x2, 0x101, 0xffffffff, 0x0, 0xfffffffffffffffd, 0x42080, 0xb, 0xff, 0xfe60, 0x5, 0x1, 0x16e8, 0x3, 0x5, 0xffffffffffff147a, 0x9, 0x2, 0x1, 0xfff, 0x200, 0x1000, 0x9, 0x3ff, 0x8, 0xfffffffffffffff9, 0x3, 0x7, 0x20, 0x8, 0x8, 0x3, 0x3, 0x7, 0x6, 0xffff, 0x0, 0x4, 0x3, @perf_config_ext={0x100000000, 0x9be}, 0x80, 0x200, 0x186, 0x0, 0x6, 0x7, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xf3) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000280)={@rand_addr, @local, @loopback}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001c03000000feffff7a0af0fff8ffffff79a4f0ff0000b7e9259a311ad660ffff2d64050000000000166b0400010000000404000001007d60b7030000000000850000000d000000b70000009500000000000000"], &(0x7f0000000040)='\x00\x00\x00\x00\x18\x00\b\xad\xf2\x00A\x10G\x00\x85\x046\x80\x9c\xe6W\xd0c!\xd6\x13\xb3G\x81\xa70\xa6\xbb\x93\xd5\xee\x89O\x96;\x7fN\xe7\x01\x16\xf2\xcc`\xf2\xc6\xf3\xe1\a\x81;\xac\x95\xaf`\x90\x7f\xfe\xf5}\xbf\xbd\'c\x9f\xbe\x01\vlt\x85\xa9J^x\xce\x91;,i\x9d{F\xb2\xa1\xd2\vM\x9e\xaf\xbc\x06?\x01\xe8\xf5\x9a\xff\x1e_zF?\xe5\xed\xb2\xbf\xb9\xa2\x84\xfc\xf9\xb7.\x16smG7&@@\xec\x12\xca)\xa5\x04\xd9\x9e$\x03\x1e`(\xa1pY\xbd\r\x84P[\b\xbf)@l\x96z\xa1p+{\xb0bYF\xa7\xbb;f\xb3\xa7q\x1bn\x19y\xce\nWK\x1a\x1f\x06q\a\xf1(o\xe2\xc0C', 0x100000, 0x0, 0x0, 0x0, 0x100, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffdf3, 0x10, &(0x7f0000000000)={0x80000000000}, 0x10}, 0x70) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, &(0x7f0000000680)={0x1, 0x8000, 0x1000, 0x5, &(0x7f0000000600)="a8e0df1a2e", 0x14, 0x0, &(0x7f0000000640)="7aa0b1137e0221d518e00fa1d98623edd1ecf8ee"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000500)={'broute\x00'}, &(0x7f0000000340)=0x78) 12:04:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa3000000000000fff8ffffff0900000000000000b7060000ffffffff2d6c05000000000065040400010000800404000001007d60b70300000000006a0a00fe00000000850000000d000000b700000040f7a5c64c11dfcb00000000c92d00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) fcntl$setown(r0, 0x8, r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000002100000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000000000000000000000000b3d1d4803e0a4ad1d58ee4952a07ac6bea0eb5ab7d4d157cd59569a84a3b4042c72d84d510b28d5bb59af678989e387fd51fdd448f50e9b79958a313ac0cae2ee6a772f4adf7d6ff32c051ac82a1c21de463f72e86e29fcc3522c78c3d27621401ea5bb0533b32e2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f0000004840)='/dev/bus/usb/00#/00#\x00', 0x6, 0x4000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000004880), &(0x7f00000048c0)=0x4) statfs(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)=""/69) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket(0x4, 0x3, 0x0) sendmmsg$nfc_llcp(r2, &(0x7f0000004600)=[{&(0x7f0000000040)={0x27, 0x1, 0x0, 0x6, 0x9, 0x40, "4095e4208523a1bd6c6c20b52f8ed2f8e1b89d7d701d2af7880902cbbf042497d200a0992b9b9ec201a3a716eb149aa28c8e4378d6698d69fb226e460eece4", 0x12}, 0x60, &(0x7f00000000c0)=[{&(0x7f0000000280)="5ec93e198d4c925c6c1d4fcb37f396cba5fbd3a6012696e49f9a430ff02a37c70a867e67a77a5723441cce94e15c98d285bb6bce47682e3159060a05636e535064cf7370a2e3a3cf86d8dfd5a0bce1408f756f877caa245905b76d437c7aab35009cbafc7d75087b4bf9c4761af682f70c4a1b5ae62e67975ec851e27259a13e05ddd302872333b0cecd63cf207973", 0x8f}, {&(0x7f0000000600)="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", 0x1000}], 0x2, &(0x7f0000000380)={0x60, 0x11f, 0x1, "dcc60abd135cf99ade46d4bb5aba7824c6ddfe74c2cf6f29d0f7a264ff5f99cfe4be667947610bb6e1fe20ab14786cc3359963392075ca34b217ca2352163116abcb9e0f129eef9eb01c8ca4037334"}, 0x60, 0x24000004}, {&(0x7f0000000400)={0x27, 0x0, 0x1, 0x7, 0xfffffffffffffffd, 0x9, "9ce0bcc97711dcce28fc24679e98c27c7746695455c6b7fa795c017cab9729c6a66de284c17d6623a2eed223b5f8e3933d55d61fe27887e4b25a369aaef955", 0x7}, 0x60, &(0x7f0000002880)=[{&(0x7f0000000100)="367d543d88e8c841604f7279d3a03989b2a5dda1182acf87fff701dd39db386f6d0c74be", 0x24}, {&(0x7f0000001600)="976e0a0cc4efa8029ec1b81e6ba07c9e209c966562d1ebdf853551e8693121faed2be39f7e161e84085da3c42b2abeadc3b16202abdcd1f69e9bd845a44ce48d01fe41e65bb03e15882178c6c9673f0db865999e24af90c995f9520799fc9bb0a29bcb3d827aa13b62f52c596aa6095c6ed94ad328ab28b8f2d226ca0f743cc0d6cfbf188c11ea5ee7c3e79d3e785c8271e456f97d7dc5aea75cfa825333c6b2bb6ce98c3a5b5c61128e83209b7dec0742ba013b1757796f028de3942463a589e21d3e2e54282b55c7e67a725b6ae86f23fd412c0fe7ebc76e67a16ece", 0xdd}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000000480)="d765a59c571e02fb57e5b66eb4d9347c73b53daecfe9f70056335a829b5b3174258eb955958cf156f67bc6b54f387327c2f7b476cd4781430f35560985", 0x3d}, {&(0x7f0000002700)="f7ead77b71004856b5a80117ea4bedad31bbe0359c68190bd211937040fead4ed56e8ebd14c8ad5fd804a6339d8d423a7db0957f482f698be3f149df8b9d2d2c04c8ec0f9bbc1cf2cf4653354ecc8339394214207512eb90791e55aba1e88c58390788", 0x63}, {&(0x7f0000002780)="2b434831c7a45f28ff4affa7faab740bf55efda4da38d8d91023bb8bd6123578807f4b390ab04871e17c9cb20421cc", 0x2f}, {&(0x7f00000027c0)="26d2f6076d76aae417085ac8df21d1380bee44d35cd73307c0c745130b77668b8021d588903e96c6002e6526e85cfa866a58cae1c2b4d74cf3262fecd1e939179157c812b96bf186aaa154e82c34f5744ea0058ce9aaf67d709c21584586c7803a0b407120", 0x65}, {&(0x7f0000002840)="9f8a414930701f91314a36dcba63ce1ff0a4d0e6824a5aca3952f032a1e52a", 0x1f}], 0x8, 0x0, 0x0, 0x4}, {&(0x7f0000002900)={0x27, 0x0, 0x1, 0x7, 0x8, 0x0, "cc60b15ad144b6e5f0db2307397005085a375c371e7aa162266cf77e54641a2ce08fd8f28857ea618f941e8e5c4c6a1d05536a376b2df363d7f60d8d9ddd22", 0x1e}, 0x60, &(0x7f0000002a00)=[{&(0x7f0000002980)="53d9018dadbf5fe8abf929183e15b8cd05c32aabed892e3a27334bcc657b08dee52a73713e96ec8eede48522c5d95cb1c1683d2189e2fb6c5246e61f45f795716ba77072711440", 0x47}], 0x1, &(0x7f0000002a40)={0x1010, 0x10e, 0x7f, "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"}, 0x1010, 0x4000080}, {&(0x7f0000003a80)={0x27, 0x0, 0x2, 0x3, 0x2, 0x0, "1454677945fd78499bfec784afc5f5bf1bf4a1490f27fc54a6d94afae5233c5c989a628a11a1f292ecfb648baff18127760c5e9b808ae7df6d2624c897638c", 0x5}, 0x60, &(0x7f0000003f40)=[{&(0x7f0000003b00)="a0cca00f8cdf8476ee0efac8229227571354ca6947f67a7c288f2e39b7cabe174599c2ef8bf24df87208745aa973db1c3206c7234a41275215e3dd8f9107208a7793e1388ea6a385cc2800ef30972ee202e77dbbbb42ddec45", 0x59}, {&(0x7f0000003b80)="c8296c98e2358df93457c21993cb7f69769fec47116476824f05e9d5a1848f3d13aa8e01c135b2a9f34fa2f254b62e5efad6686ee3d493d494777d5af5c30062c9f1099677eeaeb2b961f0c7b55d58e4cf0a583db2cc4e2f005efd5e72366488aee53c5e5f4d46134838eab5d08f8439a72efb2cfead47f8eb00ef4416a5ffa0cb2c28801de76f727301e24b944882840d2fd20ec724d533dc4a80a8fb10c0574e95e4bed61b8c4186c3abf9fc2fe25e4689e66fbc", 0xb5}, {&(0x7f0000003c40)="7a065d9baee4c4818a39f20b7c31d63524f3c31dfb9bb9671fe3b83e13f957a391d4e3153f505791032a1ad4a5a86fb11698fd53813cb818bfdfa6df1a048f4e60b0c553ed4637016d8b5a5158", 0x4d}, {&(0x7f0000003cc0)="fb0fb310aa9e052f6efa66d26cf884ecb1278772eb145278d4a53626ae22c47b28bf6e4e1296e77e06ebdaf177eb4937558318a637", 0x35}, {&(0x7f0000003d00)="117fffc70881ba7bcbe7f712ae2d35d4308907211450af56111f98635922a9ecadda13e730c94095298349bc9395ea4321224895c368e7d49d082823993880d9ed6defba5a229ce008df2b5eb42a93e6016dc169553940783975ba482201a29528613494de612ecc34a13dffb73e6e6d91e33466245343f39d9b181272422c5aa8e188adf46c48fd0d95fbfee5bd0cc0d531133d0662541291bc8e25a70c3dacf90cdf1cc9c2ebd9ca07e141b1bfdb3e7171", 0xb2}, {&(0x7f0000003dc0)="3c0bfbf12b133b47f9d7d6af1a3846abba131c2de527b362e80e599495e26ea623c0ec2c768cdb9fd8d8bcf92c12ab6c2ee710deff1ff97b606ffbecb0c1682d76450ebc4f118332f0257985277551845823d8ddf808e4ce3711034a3f6202ae853d76bda9d43d5666e2fefe9d22e957a24ae3aed3382c2ed88c208b9921254ba64b909b1358ea4122d3feedb02309ca7511da233ffb7cdac7967ab056", 0x9d}, {&(0x7f0000003e80)="eef73057863a2022b48d5dd80b04385804ebf9da293d6fa67ae6719f809ee6612d912e2b3200af351cc71d52ce4194b46a668c2b8750e9a2f77cd488a40e875b3c6433fdfdda11a4e55ed7edfeb1302476d4c7137408236d29904bdbcb1ba7419ff5c8234aafdd5271172ad45530275a297d92bf9c25106b2a581d5f968af5c9b3078d228b81d5972669989386a05e", 0x8f}], 0x7, &(0x7f0000003fc0)={0x50, 0x10c, 0x8, "f8a0b26a25a5c4d178e5c2155e4ad2f27226078566119d275ba6b9a393c0ea08e4582c078f5514a78489a24cf62b05397e8ea591bb5853ba398670b97edc5b"}, 0x50, 0x50}, {&(0x7f0000004040)={0x27, 0x0, 0x0, 0x3, 0xdd, 0x400, "14ad675e3ce6329ead7aa8f9af1de3544a6ac3184f99e84e5888bee6df2c1989075bfc18728d96924f66944bb267cfafa2c3bbb174ef9445205fe93f9a6305", 0x3c}, 0x60, &(0x7f0000004280)=[{&(0x7f00000040c0)="6941785f69a9f71c6c13285b8e3c37cc6044ae67076a64ef0d3dcebc2a250fbeb8ac0f60fa096f6b2a6a614a661cc1dfa80d09bc547a9e1d1a2dd7af9852978401ffe8437e6111b014221e8a6693a4e73fc9a6c3a7c1f48feaa06f153a93b405390480cf34e8919d9c7fc604c61e261163e3774622a31c991887b9f5eb8d97c0b7ff9172b34a6930d469b056aede395fcd14711338de1940e7af134b5957b4188f7d0b10dcbdc9ec6dfa2a2fc184b07c3e11872aee468d1edfc4618d945ba6a22601601926f318ec8b5f6720b46ab0b0c4", 0xd1}, {&(0x7f00000041c0)="cb6991c1276dec8cef4e3056875c09c984bbd3ea09d0519ebc6f1f6ff22e6dd8b275fb335ece0a5f31b7181f4d9962a42e7a0f76624490d085b1b89d81bf1d4aef58a12874f34d497e42ca95a46b48e7c00c555ec9377a3e62a50b815d384bf6c2279a9e975d6a108082e3de31774f9e70bfe12b48a27ec0528fcf6b0da60e6f9fbac545ae11fc302e4cf27bd53d7bd7e71d95bca35ea992826324ffe1041f2710d3de59c1e72fa456383650e5b8139ea14c", 0xb2}], 0x2, &(0x7f00000042c0)={0x30, 0x10a, 0x3, "4e89863c6652f65360ea85eed548d2f253b4d0b3b536fd21d6429ac2b297adb9"}, 0x30, 0x4000000}, {&(0x7f0000004300)={0x27, 0x1, 0x1, 0x6, 0x7, 0x3, "3a9a9c762dac5e4bbaa32f3f6979170a1f24cb4798266b694be4814febcc97ab604acff53f1675df3dc18035b4ee3d1fc1987083683175e05a58f30a163bfd", 0x3b}, 0x60, &(0x7f0000004500)=[{&(0x7f0000004380)="019e3ac26540c38c3597d6cb887c84986171c76751773bc411d0b20ca0cc10a01aa665ea56500c4dff56a1e2cc1eccda549b0cfee6c09c4e68e2756038ad8506771997d63258d76d8b6d661852c083a582414b0ca2fa711bd3b89222ddacf06519317f3f09c3223296c01717de5def7568193f693cdc2f65441cf89ae7b4099107e74d17671971ea511992bd879c98165c91a745209e90eb7d2e77b7d0b13a101d19473e2bc19834d6a89fa5d906198bb991582486707e8e5382e4401c898cc5bc3ad86b6f0626845a3c85197043b07db2f5245f0b7a5be380c31e64", 0xdc}, {&(0x7f0000004480)="fca954744cb8ca206ed8f98fb9ff92bcdfdd83acdf7734e4f5c5d186fd7ef46a3061f1b02fb3d63cc0df2d1fe3f048f3e3a86a30fbead22d507b84c72d52e4854d1c1d45b27122c8da8081ef22fece39e85290a29849245a6b7eb6", 0x5b}], 0x2, &(0x7f0000004540)={0xb0, 0x11d, 0x40, "12e2f8cacff5cfbabf4a25a520eccd37fbbdbd096b668f96a9d6da75af7e79c3138016f8e72840cb1dd7662e33b219a4f64856ad8de527fa6bb1df5bf0b7d4eb64a78ec27831c1ad92c67816a2189e0b0d92c51770fd792664e97f47236ee1537798d5d16220f0f8a0ff12f13c8a0edeef8b921ab72d05b3077d3b1c48ef696899616a121301238ccfbed0f1ac723085570cc4f88030682c2180e1"}, 0xb0, 0x80}], 0x6, 0x4c000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:48 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[0x8001, 0x8, 0x8, 0x2]}) 12:04:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702694253c788b492650047d400002577c339bfa30000000000000703000000fe00000c00f0cff7e4cff0690327c8890c71fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x1a0, &(0x7f00000000c0)="b90703e6680d698cb89e40f02cea", 0x0, 0xfffffffffffffffe}, 0x28) 12:04:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0xf104, 0x3ff}, {0x3, 0x7ff}]}, 0x14, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe9, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) 12:04:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8fffff0ff00000000b7060000ffffffff2d64057ec405210065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d400000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r1, 0x3, 0x49e, 0x1, 0x1}, &(0x7f00000002c0)=0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x263, &(0x7f0000000000)="2cea00000000000000", 0x0, 0x3c}, 0x24) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x284000, 0x0) ioctl$CAPI_CLR_FLAGS(r2, 0x80044325, &(0x7f0000000080)=0x1) 12:04:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40140, 0x0) sendmmsg(r1, &(0x7f0000005d00)=[{{&(0x7f0000000440)=@nl=@kern={0x10, 0x0, 0x0, 0x40}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000004c0)="4637c458c70caf6044c85974213ceb20b7d4f87d1f1159c29ac7820b51575c4739128780cf7df261a2d6a82c68a1df85d1457855869f239948ac59a6d3a24abea1db5d2933a07bc017936d4612aa38598861d18c2f1b7d9a4849b28fdb9d0987aa9200c5966dcac1bdf67cc6674e7b7bc200f49cb78f7f8d6c61250349dd21358153c3ebe36c80362e27bab2595f0c1dbb87359052", 0x95}, {&(0x7f0000000580)="b2eef49b933f", 0x6}, {&(0x7f00000005c0)="b723d20f5c4cc5388d1ba18d1851e739ed058135c5b52c8f65402cb1cc4bda426394c2623b421284ffd35dc2079771e18cd014dd3c025f94483e49f4ea80d45b856827fa7a7bfc4414b0fd249b4ac4d876c8ceb48d4e417e30f1f7c278219ea0f6a8516e6f69cf0fef989078", 0x6c}, {&(0x7f0000000640)="5e63b568a3808c3344ec94111bbc3ab1665428d3fb711d90abfb8579ff2eb4762e47caf17a1917b954501f029fc131d10b674766be9c52f56dc8eb63f0a477d9a2370664d59e8a8976c210ba5b8e7fcec330ab0ccc", 0x55}, {&(0x7f00000006c0)="1e1d5a641d3653a37e232a9ffd1643ea9e0286cdaf1ee8d41fd5ac014ae5762600600e1dda4910e1872ed565ae0051e42d5cad9c5126952fe447c55df367ff2662624130ce751e55ada4fb7ba1b7a4494a517e74a0c56933be99e8bbd71aa16de0f46e402d0a97692056b14b6cd0c172f1df0f3a09cb8712c1addccfe3bed305c92172716e4996cdae1bcc75df6b1df976b5a45eb46c0d66f0e207e40b1c0ab7d39045abc5c69a9acd8cc3", 0xab}, {&(0x7f0000000780)="9b04293661e7f43081042e79fb8127185c44c6f20c2f4d903f5644ec9c27eb7457d2a956597b45a3e36ef802aa362aa5a98ea85224c229eee8840d78ce273dae0a428e814859cd1e39be10678fcd7084fece51d03631f747af37a2bbaeca1d26347d73a129abbc797e8cb605a3f91cf077e5c0462eef6e8ea3ba19972a33a06e7ebed35907e2bf2407b2bde45708052ac168779ba3bf478a801d90b6d3f4797102486f14f21dcdd7fcc9e7ad6992e96c786240c617e6c31b412c34b335a04b57a80ece05f8b71d4f4019bc", 0xcb}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000001880)="2466b16480003a4427fec82c6f262daa4029740865d03710fb760b2dd572095d73316992e5f6cabc33a6922e25a8fb30764f404a09ba9506ceaa750efbf7c9f4e08adb7c45466472f2ed0e798b7f8aa06efcf6356cb306524fa98ffef44b59f6e9eb9eaeeec4b16c", 0x68}, {&(0x7f0000001900)="1ffe0cc82aa8a7e8df6ae821074fe094dd3f343aa62888d43c915b33430bc81be8e489952c65fba5fd140c0bc762ca44cf64daabfed37d64b2d5165bdd1b2bd36dda6a8f0bbf3ab8bac3d45aec444f7903d5de952e8fe329a1c6ccd7e8a767042b920db60933882948486c62a93b4560e4e8e10965f708087ea8be7bd40784cdc14b6d33e5be80e91ee116697982e59b02552baaa7430eb37699c8802b96342f96427ac35df9dac91bb69aac1a288080a67693", 0xb3}], 0x9, &(0x7f0000001a80)=[{0xb8, 0x111, 0x1, "54081878f1ad4d55d0ca53988e63d3bfe3c1186e240d5d7e6d8551327f2fba308ba44e037ef6d7bb3e7b5c2b53a7fe5642dd8ef9ffd2df1477078a9e73a2fd8612c01423acaf5c2fb20cf2b521b20d758de2964c80c4f4654d3c02b6e093d5bb7a5fd9c4a13b917be2d6356a6465e8835e9731854c2bef178463e0acf0ff423eccce687f5605838df35772df628b0a6403bac3449f7fdea1974be22c30ab7a23dd551e"}], 0xb8}}, {{&(0x7f0000001b40)=@in={0x2, 0x4e23, @empty}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001bc0)="1e9939521ff5c64bf1c3061f40f4918eb27c56ea4012750440b3426f65880b3a0beb0db2a5a1af6ad1dbe5b9c59350a0b2246e6aee268710d9bc058c558d122dda7faab8c62c411ab0c34f2e394d5ebc293b9a646cc24764931ff996685fb53ae82fa7c55d3630b2f0d9ac22ab5346f62e91ee820feea9c6fd762f4297de963d08ce04b83affba06a7cb5281513f7fb7e6f3c937e3da8a823560117dff71b77b52f91a766b90d5453a175d1de383c4ce2ca00616cac20fc24bfeaeaa87b64656db1e0b05ae8369f150c0eaee06577f54cd9e39537d3ec11362d5f749f52b296b7c57440872a35da6", 0xe8}], 0x1, &(0x7f0000001d00)=[{0x1010, 0x0, 0x3f, "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"}, {0x80, 0x3a, 0x0, "9ec8fd640160539cbf65c1c3ab60c2cd648c46a23ca0cbebc1df1358b3551961620d45e0b9d60f424b6af09b079a3de920f6716ab69d5d4d9172cec6f00c6710621f4ec7a9c4ff81df95e737cb8c6a893bbc1319e28123a29123abae8f2a2389d863480893189be8e29dc212651f6f"}, {0x18, 0x1, 0x7fff, "b4345b76ea"}, {0x20, 0x10f, 0x9, "d284aed717a5489061cad6"}], 0x10c8}}, {{0x0, 0x0, &(0x7f0000003100)=[{&(0x7f0000002e00)="d73b09a0737a40e4836ab6082ea117ed063138b08a07e3b0e4d21b26ec9a9b926b3b7028ac82d8e18535152c98d0fe3e6535701da0ebc30eee3d6d", 0x3b}, {&(0x7f0000002e40)="0f28754937cbc3f51313916aae705c50a289813b9af6c365accac7b9393ad87c5ec166b3c9c86dfdb70cb96bf5d6891d5f9e4825cd83aaf4e1a091d4f9683bbffcaba386644dce", 0x47}, {&(0x7f0000002ec0)="e00fca0af1e7f5018c9fea0c17507b024a390fb3f46fce1a4d044bc046bf9291c4ab0392490f197933550ade9386d2c7df880ae880afbf54c20c591eac56abdf38c45b7bfd26ba3b7b89bf90ba723c21c2aebb1a098c88c484e50c589bd498bad00945d2364a811d9a148ae67d3c91450d64e261eba74bed07b51027a84c27e613057ab3b6112d", 0x87}, {&(0x7f0000002f80)="e85282f51b15681ab3a6b1dadcc4f7139fa4d3d0822dd18e48022de95422b7224d209a50a577797efc424cc64f8758273d0833bd0c219e91dc90d5692e0b3303b31b3b4f2fde4878282dc7e82ae246f0e36256e1f9ef224f7ed943b7ac82cc6a00f3cd3f050de5719320e949669cc3ed4678f83206e7c5ca7a63eff23225b0990bc12b695f2cb7657d27e210df3f65492e0243b5f85bb080dcbc930816caa67a0bbbc3ea63422970", 0xa8}, {&(0x7f0000003040)="43a88818fb526fdff4da6f864549cd93e0728cb94e52fc5a4d2296a017d7b32f53401c9d88ce9f4990817f6c2c9f5721a3c972e47a57770e3931e54c43d70cc343b1927fba62528f423b1224a34b192d7812d429c4c929092a6fc97737b12942e135b7f393f1f1e69a9004f805dcc60bd04afec962bd6f4a6a59ab84d6427c5da4d3c68c4090779cdbb0eb6be0ddfb565899d336303ee250c31ed7f87be86d9c74a506473da3", 0xa6}], 0x5, &(0x7f0000003180)=[{0xd8, 0x11f, 0x3ff, "3d766a73df4a17be3d93ac76a5208b43fa9e2bf0e788cbd2340ae664bb41f42532ba85abff1ba86ee864ceb63e7df09665d6da778599607b0040f167f080bf14eabbb538f2c97c7e6f4278b97af71dad1e4650d306e1f1aee57ffd63c1946b4480ad848c908b15131d9b2134d5d503a66b22c89b2554ccbb8895e5f0c592ccb87cdf93c7efbe1776303a9e37a1caf5914fd5211cdcbde4e78a98f6d962091b9b2f8bcbc9eccdd4e082e27680b509a78dd2b2ae4ffd1db140b223ac6322bc52b2b3"}, {0xd0, 0x112, 0x8, "5844e3252ab4c9a979c7dfc16eda17270db32e20bd4f4e42c9a3a246a0894657e72f77a932dd732e9f7fca90d5af2f90251cb2919dccfca43231aba3cc44b323743fec67636b0a3fa353c701013a0c5d2dfc1b1d9a0a403debf2406ee0f2103c3da471dde08602c38fefda0b4fab22039f1ee51cc568be929dc2a267e0515e6397d360e0a20f92c3ff6de47596e77e6310b7be88dd8e403f2f9a39a3a5def55e783069a85935bee49d77bfb53cae1edfc68a93018c68249205d8"}, {0xa8, 0x10a, 0x8001, "38739bddba659182ecfe899ae4f46658057c64c464d5e03afa78eab3d18f60e4fc1eac3b798623337e3cc3a34caabf6586e1018f1abb3a0e526d3de4a1297f510b42891b0679483b4ec99175c9716d8bd56cbc787141283d69b64fef4045609a686f42b5766f65527061119e4121698e9c7181b5818368a02076c0acb689a2a9c3b0037caa6d2f01236edf9897ec3aad879d48278d"}, {0x98, 0x111, 0x0, "7be73b94438b13a51031f28c01c248d65c6f6f600395e0528c4f49991a529866c4e916627c98d27b5ff2cccdd1653ea2e085fc36dfb7fc33d37a2ad9b6d849cbd82c6c2f17220575d9e9dcc333715ece8cef448f9c9267242413ed9605078498f13fff0a8a72dae0ba57dcf2c91ca8342d084b7166655a39d5d4faa57980b89112aca9d98246b513"}, {0x20, 0x10d, 0x8, "0e6989ae38518ca4bf54b31298a6f216"}, {0x1010, 0x11f, 0x7, "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"}], 0x1318}}, {{&(0x7f00000044c0)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x800488}, 0x80, &(0x7f0000005800)=[{&(0x7f0000004540)="c52bc902bd13c5fce1b5cfc82791ea3a0d737e509390d08dba0beed19cfa", 0x1e}, {&(0x7f0000004580)="b39352e0b5f7fa2316a54c1ad3213d316b748242323a5c205402e7296645741efae39ca2766889ba0a1fbe667b9588ab9d6ec5206d8227d15ba85a4d4fe5626d10fa10c5240d", 0x46}, {&(0x7f0000004600)="8fc647f48d9fd2703d49c1ae92d3dbd02b76184c8dd107d3c1c77413e304136dadc05db98c17337ced92a9674249489d7dfbc08595c2611b7703dd7d07dca20600022732a9f48face1249a3eea48595b0e0d8f9ac56d0069b45f5292dc332ec8df34a166033654a6585f2c31e6997a9218d8b916ca9c31d1169736244c27137e5ef87e227b16243a5a98f6b5623c2998615703a5712357648bcea8ec982a1af592dc1a9c6eb24093f5cc5055982de7d0db666fd5ea6606fcdf0b4c29d3d349aff48fa11137e56e199f48d3b7b522f4226a4ad59dec994fdf2b7a4ed5ac26025562c585f9f7150b05b4f4058aa70aa1a544314e90e7", 0xf5}, {&(0x7f0000004700)}, {&(0x7f0000004740)="3459671e61fcceaccffb9e75e7f985a451b4dec509abf501f5a8d8ad2cb2d687329023bd4f5c945589e4984137e2373838b2d7f464cfeb601b2a7eca67be86a4e36a530d02ecd5c09eb26d83347fc265ce78b74c30814d12718a2e1e457c6747a5c0cf93a32ec355f2360cdda61a73fafbccaa4fc8cee75f8c792d8d9669cc48a90cbda38f0b31f57f6efef075322c63e9cbaf77d07b9bafc03df6d69a0b25bc1405e3", 0xa3}, {&(0x7f0000004800)="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", 0x1000}], 0x6, &(0x7f0000005880)=[{0xe8, 0x29, 0x4, "fba0e71b727f7a3b8831ec823ed226458d14897e50f436cc290150416fa89ae8ccd349b56844b597c02a1f24aee96235f511b1c920e26614e7e0017c0e7952c3f435eb87449dede3fccb2708e42f0b7f15bf4a596fa4c174190009668de1d41500fab9abb0c224e3f573430a29783faac6d872ad087902ecbacfbc1b03029b7a56787e31d2db8c16cb77478f55f5663dd11115c08bbbad526f487190da6ba230989c2add994aba5663ae6557333b4038039c67aa55343d18e3e66da424ccc47aa4ddaeb82f588a7815d2fd8af8583bbd2805770cb005"}, {0x28, 0x13d, 0x100000001, "a2f6e17f8f03aa51c2e11b7933a5ed7bb402e91e"}, {0x20, 0x10f, 0x80, "f235a7d07ebe7dc9c2148a9b6a"}, {0x78, 0x115, 0x582, "9ec9a48e3df83053f13bd3c325c7de9e636fe28360d90238844a25a8e7241aa34268c1f11878261a165ecf4f0bc0155846231d57fff9dbc027edb6486bc50c7a6a4a413ba23aa0ea346df44c170e9e045e39ac7f5cb01a1fdcca5e758f7d47c9c5fe"}, {0x70, 0x104, 0xfffffffffffffff9, "e683ba2d5e79d7a71cb864ed2277fb8aaa3294cea21892e557253f47a26bc3fdef213146c14f1d092d3311b793bbe3a99b304ff0cf7334e308e4100451f81bb976ef0ff3035861e546e97ef8f020db1e19d597dc6b925f0dba96d395932320"}, {0x110, 0x103, 0x3, "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"}, {0x28, 0x197, 0xffff, "2a1728ab6d788600711acb506b01f30b8b7a4e4d"}, {0x50, 0x10b, 0x9, "8a4101f5b1f50e8be1e9bed55742fa97f0a9c4561a85f98957f4ae0f207cde51e7a24f98e60e3cb8fbc32107c545c429165b2a58c11984c98e"}, {0xc0, 0x119, 0xffff, "f9ce05c4412614eb163a823ebe88638f5c86bf0f30a334971d50a3a9453e144df5747bd0f5c5bbbd7bf7e1b780c96659cb4a9ea9fa1c73adaf576e9aedec0cca9a6a77329e4e4a0776bad8579c796d056e6424ef904edf8dbe2d810d1b5dcf8cd09cc951fd639cd2a5590d4cc756acc9ddf9bf9f3aec40d3346f1fc5713cbf4b481ed8e16d9c996e30bf518b6525cb92c865ded180909684fa77cca5d68ebc9663c3c4fa06e4828a2d"}], 0x460}}], 0x4, 0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000525bd7000ffdbdf250b00000008000400fe0b00002400020008000d0000000000080006000500000008000400040000000800050007000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x40084) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 12:04:48 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x30203, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000002c0)=0xffff, 0x4) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000040)={0x10001, 0x72, 0x7, 0x0, 0x0, [{r1, 0x0, 0x7}, {r1, 0x0, 0x6}, {r1, 0x0, 0x317}, {r1, 0x0, 0x7}, {r1, 0x0, 0x8}, {r1, 0x0, 0x8}, {r1, 0x0, 0xbaf6}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff05000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x9}, 0x28) 12:04:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400040, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x400003, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000500), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0xd, &(0x7f0000000040)='team_slave_1\x00', 0xffffffffffffffff}, 0x30) ptrace$setregs(0xf, r3, 0x5, &(0x7f0000000280)="74f58b3a2b703365c01cf4c09968e020f25b1d0457457def9bfa02f94fcdf0ae53daabb64aa6a11ce17ad7615c3432192fe8c875c70f7c3ae85b3e2d0d5f8fe1d81d41c7a764c7675a52e59311df9cfc3b6ef495acf317ff9e881462446bacfb8e83a22417e1db8b2e19acaea8172b") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team_slave_1\x00', 0x0}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000000480)={@loopback, @loopback, @broadcast}, &(0x7f00000004c0)=0xc) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f0000000300)={0x0, {0xbeea, 0x1f}}) bind$packet(r2, &(0x7f0000000440)={0x11, 0x7, r4, 0x1, 0xffff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8fffff0ff00000000b7060000ffffffff2d64057ec405210065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d400000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r1, 0x3, 0x49e, 0x1, 0x1}, &(0x7f00000002c0)=0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x263, &(0x7f0000000000)="2cea00000000000000", 0x0, 0x3c}, 0x24) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x284000, 0x0) ioctl$CAPI_CLR_FLAGS(r2, 0x80044325, &(0x7f0000000080)=0x1) 12:04:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x1cb, &(0x7f0000000040)="b90703e6680d698cb89e40f02cea", 0x0}, 0xffffffffffffff9d) pause() 12:04:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000140065040400010040000404000001007d60b7030000000000006a0a00fe0000bc0b716100000d000000b7000000000000009501000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) fremovexattr(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="75960906f3b671425dff2030137365722e"]) listen(r1, 0xf2) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0x8000, 0x0, "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", 0xb0, 0x2000000000000000, 0x62, 0x4, 0x5, 0x9, 0x6d}, r2}}, 0x128) 12:04:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8000, 0x0) recvfrom(r1, &(0x7f0000000080)=""/171, 0xab, 0x100, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x22}}}, 0x80) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$KEYCTL_MOVE(0x1e, r2, r2, r2, 0x1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000380)=@secondary='builtin_and_secondary_trusted\x00') 12:04:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:48 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000000c0)={r1, 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000071000000000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe80001000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:48 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:48 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="b702000004000000bfa3000100000000070300001d9fabd8ee6c50d13d9a43c4b5a42d712389aa0a00feffff7a0af0ef00000000b7060000ffffffff2d64050004049312b2b35575427b0000000000006a0a00fe000000008508800027000000b7000000040000000000000000040000000000003491f251c5ffe3ce6f4a3d24f44964a3ddbde8ce4e3ccbc3ebc20937cea032f246b7f46bbd5975c5a72579b2118a86d34db7a3254f1f1dac8369109a8c53c8ba900e18bd9489eb5d7c8fc009b0a0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r1, &(0x7f0000000400)="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", &(0x7f0000000080)=""/6}, 0x18) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) 12:04:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)={0x0, 0x0, 0x2}}, 0x13) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x3cc01, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000240)={0x80000001, 0x10000}, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:49 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x1800000000000060, 0xfffffffffffffd17, 0x0, &(0x7f00000000c0)="b90703e6680d698cb89e40f02cea47a45c3a3480", 0x0}, 0x314) 12:04:49 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:49 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400040, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x400003, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000500), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0xd, &(0x7f0000000040)='team_slave_1\x00', 0xffffffffffffffff}, 0x30) ptrace$setregs(0xf, r3, 0x5, &(0x7f0000000280)="74f58b3a2b703365c01cf4c09968e020f25b1d0457457def9bfa02f94fcdf0ae53daabb64aa6a11ce17ad7615c3432192fe8c875c70f7c3ae85b3e2d0d5f8fe1d81d41c7a764c7675a52e59311df9cfc3b6ef495acf317ff9e881462446bacfb8e83a22417e1db8b2e19acaea8172b") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team_slave_1\x00', 0x0}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000000480)={@loopback, @loopback, @broadcast}, &(0x7f00000004c0)=0xc) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f0000000300)={0x0, {0xbeea, 0x1f}}) bind$packet(r2, &(0x7f0000000440)={0x11, 0x7, r4, 0x1, 0xffff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x5}, 0x28) 12:04:49 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x6, [0x8, 0x3, 0xfffffffffffffff8, 0x9, 0x10000, 0x6]}, &(0x7f0000000100)=0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:49 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x1d2400000000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x441c0, 0x0) 12:04:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400000, 0x0) connect$ax25(r0, &(0x7f00000004c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default, @null, @bcast]}, 0x48) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000540)={0x2, 0x2, @raw_data=[0x100, 0xe960, 0x0, 0x6, 0x8, 0x4, 0x4, 0x2, 0x1, 0xffff, 0x2, 0x5, 0xfffffffffffffffa, 0x2, 0xbfa, 0x5]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000280)={0x100000000, "9d8371f8214f8a48e206d4ee43a115ea5878f5e3e898f0609e93c080bb3a937c", 0x1, 0x3, 0x2, 0x80, 0x2000000, 0x6}) 12:04:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x80, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000300)={{0x6, 0x6, 0x8, 0x101, 0x1, 0xf20}, 0x3, 0x80000001, 0x8}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000000440)=0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000480)={r1, 0x0, 0x8001, 0xfffffffffffffff9}, &(0x7f00000004c0)=0x10) prctl$PR_GET_TIMERSLACK(0x1e) syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x1, 0x8200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b706000000000065040400010000000404000001007d60b7030000000000106a0a00fe00000000850000000d000000b7000000000000009500000000000000000000000000000000e3852ed6bde7bbef167059984560b374154b689dc8cd572a2625869cf540d05f74d104a59a2fe73a6cf02d0188ffe53b39feec2ca8fe2bcc37c81421b6ac79b66c40a9899570c3700d991838ded78b0f1e5d64ec28e58bb4261c43884cdfe5068f33cae02f257a3fcdbcd7a9859d3320076159c4233f629e8e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:49 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:49 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x1cb, &(0x7f0000000040)="b90703e6680d698cb89e40f02cea", 0x0}, 0xffffffffffffff9d) pause() 12:04:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) recvfrom$inet6(r0, &(0x7f0000000740)=""/155, 0x9b, 0x2002, &(0x7f0000000800)={0xa, 0x4e21, 0x83e, @rand_addr="ac6cf2a056079751eb9f38b87df0c487", 0x100000001}, 0x1c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x100000001}, 0x10}, 0x2a) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000240)={0xab, ""/171}) write$FUSE_LSEEK(r0, &(0x7f0000000400)={0x18, 0x0, 0x4, {0x8}}, 0x18) connect$rxrpc(r0, &(0x7f0000000300)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x7, @mcast2, 0x5}}, 0x24) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000340)) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f00000003c0)={0x0, 0x4, 0xda}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) accept4$packet(r0, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000600)=0x14, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xc, 0x4, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffffb4a, 0x0, 0x0, 0x0, 0x1f90}, [@call={0x85, 0x0, 0x0, 0x3b}]}, &(0x7f0000000480)='syzkaller\x00', 0x20, 0xca, &(0x7f00000004c0)=""/202, 0x0, 0x4, [], r2, 0x1b, r0, 0x8, &(0x7f0000000640)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0xc}, 0x10}, 0x70) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0xc240, 0x0) 12:04:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x62200) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000080), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:49 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:49 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:49 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x2800) mkdirat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f00000002c0)={0x8, 0x5, [0x9, 0x7fffffff, 0x95, 0xbc, 0x7fff], 0x8002}) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000280)={0x0, 0x98, 0x2, [], &(0x7f00000000c0)=0x7}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000001300000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010500000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:49 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400800, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000001140)={{0xa, 0x5, 0x3, 0x4, 'syz0\x00', 0x9}, 0x4, 0x400, 0xfffffffffffffff8, r4, 0x6, 0x1, 'syz1\x00', &(0x7f00000010c0)=['vmnet1\x00', 'luservboxnet1\x00', 'trusted.overlay.nlink\x00', 'trusted.overlay.nlink\x00', 'posix_acl_access\x00', 'em0\x13Ymime_type#loGPL\x00'], 0x67, [], [0xae6, 0x8001, 0x0, 0x2]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000c80)={0x0, 0x0}) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000f40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000f80)={0xab6a, 0x9, 0x0, 0x0, 0x9, 0xad2, 0x4, 0x5f6, 0x0}, &(0x7f0000000fc0)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000001000)={r8}, &(0x7f0000001040)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000100)=""/30, 0x1e}, {&(0x7f0000000400)=""/201, 0xc9}, {&(0x7f0000000280)=""/164, 0xa4}], 0x4, &(0x7f0000000540)=""/112, 0x70}, 0x7}, {{&(0x7f00000005c0)=@rc, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000640)=""/131, 0x83}, {&(0x7f0000000700)=""/21, 0x15}, {&(0x7f0000000740)=""/134, 0x86}, {&(0x7f0000000800)=""/56, 0x38}, {&(0x7f0000000840)=""/165, 0xa5}, {&(0x7f0000000900)=""/118, 0x76}, {&(0x7f0000000980)=""/254, 0xfe}, {&(0x7f0000000a80)=""/28, 0x1c}], 0x8, &(0x7f0000000b40)=""/185, 0xb9}, 0x1}], 0x2, 0x1, &(0x7f0000000cc0)={r5, r6+30000000}) bind$netlink(r3, &(0x7f0000001280)={0x10, 0x0, 0x25dfdbfb, 0x100000}, 0xc) setsockopt$IP_VS_SO_SET_ADDDEST(r9, 0x0, 0x487, &(0x7f0000000d00)={{0x3c, @dev={0xac, 0x14, 0x14, 0xf}, 0x4e21, 0x2, 'ovf\x00', 0x10, 0x3, 0x69}, {@multicast2, 0x4e23, 0x0, 0x8, 0x1, 0x100}}, 0x44) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7ff00000000000000a30000000000000703000000fcffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001080)={r10, 0x1800000000000060, 0x2fa, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x18) lsetxattr$trusted_overlay_nlink(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)='trusted.overlay.nlink\x00', &(0x7f0000000f00)={'L-', 0x3}, 0x28, 0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000d80)=0x0) setpriority(0x0, r11, 0x6) syz_open_dev$rtc(&(0x7f0000000e40)='/dev/rtc#\x00', 0x6, 0x80) getsockopt$inet_sctp6_SCTP_NODELAY(r9, 0x84, 0x3, &(0x7f0000000dc0), &(0x7f0000000e00)=0x4) 12:04:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x143800, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x289, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x20}, 0x10}, 0xfffffffffffffdb1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 4: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x101000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x101000, 0x0) renameat2(r0, &(0x7f0000000100)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00', 0x7) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000800b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000000085e7418000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400000, 0x0) connect$ax25(r0, &(0x7f00000004c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default, @null, @bcast]}, 0x48) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000540)={0x2, 0x2, @raw_data=[0x100, 0xe960, 0x0, 0x6, 0x8, 0x4, 0x4, 0x2, 0x1, 0xffff, 0x2, 0x5, 0xfffffffffffffffa, 0x2, 0xbfa, 0x5]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000280)={0x100000000, "9d8371f8214f8a48e206d4ee43a115ea5878f5e3e898f0609e93c080bb3a937c", 0x1, 0x3, 0x2, 0x80, 0x2000000, 0x6}) 12:04:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000ff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000007611ffc18db8f484000000dc7b3559f925259e4a1e63dc9b64879dcc43658396947729bdeff579d409c8ec29f1b186919c4c78ccf696b43d27f5a1a0288b4544e8bef05aeba0c7a00103fdf0b65b734df8006c25331401bfcebc1d58ab24ec23f21fcee3fce455a9c790f5a05f5a1bd606d9f5bb7a439cf2c9e1ea43ab821ef361a7c4d890453ce76e0e8fce8f87081957067969f1f28b3ea7f90000f6ad36c583627544c277f682f43bd6d91ad8b9f6d394d2bb6673c36467a09d4958e7741c89d0a51ebd8d99a271bdbde388eaf715b42682415328f5c0193a5453d63da2e29a161e3459aa9df9c89bab2f8baf1dc50cf4669188c5ec869b585d05c7ac99e4e23562d6174e0c113ad5e18b15885fef6e3e10db4c2a53a4ebcf330eb2a2fad5f7153c88bfdda47ca6f1e2fceefa81"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x6000) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, &(0x7f0000000100)=0x80, 0x80000) r3 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000280)={r2, r3, 0x4, 0xc4, &(0x7f0000000380)="0929c7ff449e1f00dd25969da28bcf99060b9c163542d47e495eee807733889415664f29bf8a419802a715f400c60d6a47e04cbe0d225e5955df72c91b78fe5f8d1d4829176ec8ac60f2a4432e3368d6ce32a4aefba268e049f81f5117fe4f6d9b78b85415f9f2ba51950936f3d112bdca174d73b659c19329d18141c98b650b5bb813b28f26e402343eb7212ffc115278930f22fc7d6429b35bbb935d650c75b023277054ab6b5ae0115569744f93a66e6b1e0072055fef11ac92ead7072a63b1e794bd", 0xf1ed, 0x44, 0x319d, 0x7, 0x100000000, 0x2, 0x400, 'syz0\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000480), 0x4) 12:04:50 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:50 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000280)=r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYRES16=r2], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x2, 0x9}, {0x2, 0x7fffffff}, {0x3f, 0x5}, {0x7}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000ffffffff0000000000feffff7a0af0fff4ffffff79a4400000000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x137, 0x2943) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x1, 0x7, 0x9, 0x8, 0x0, 0x8, 0x8a06, 0x1, 0x100000000, 0x7fff, 0x0, 0xa1df, 0x80000001, 0x58, 0x1ae, 0x407, 0x4, 0x4, 0x80000001, 0x2, 0x1, 0x8, 0xfc7, 0x80000000, 0x1, 0x3, 0x2, 0x1, 0x101, 0x7fffffff, 0x0, 0x5, 0x3, 0x4, 0x10001, 0x1, 0x0, 0x800000, 0x1, @perf_config_ext={0x8, 0x2df}, 0x10000, 0xff, 0x2, 0x2, 0x5, 0x4d8c460f, 0x6}, r0, 0x5, r1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x3, 0x80000, 0x6, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@generic={0xc028b11b6f3ebb14, 0xfffffffffffffbff, 0x10001}) 12:04:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x9, 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) connect$llc(r0, &(0x7f0000000080)={0x1a, 0x32f, 0xfffffffffffffe01, 0x10001, 0x8, 0x8, @broadcast}, 0x10) 12:04:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b70200954e1497b28832b2000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffff000000000000000000650404010000000404000001007d60b7030000000000006a0a00fe0000000085b700000000001a58c52f00009500"/118], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x6, [0x8, 0x3, 0xfffffffffffffff8, 0x9, 0x10000, 0x6]}, &(0x7f0000000100)=0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) fstatfs(r0, &(0x7f0000000040)=""/126) 12:04:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x8000000000000004}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x80000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000100)={0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000040)={0x100000000, 0xf000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan0trustedlosystem%em0%em1\x00') 12:04:53 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x6000, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000100), &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000d516d091c27ba810f3ba9970e837b1e15433d9fb2204b3607cae9c5afc36d03887b495c48ccbcabbdad680f4923dbe07a1ad2b47330cf998c01dc6444016e25928dadbde0610e38324b0e34ef760fa38ccf4c2469c088db8992d94c44310dab10a9fc4f3ed787a247c4a31846971e75746f1d4a9a6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000100)) splice(r1, &(0x7f0000000040), r0, &(0x7f0000000300), 0x8001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:53 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x9, 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) connect$llc(r0, &(0x7f0000000080)={0x1a, 0x32f, 0xfffffffffffffe01, 0x10001, 0x8, 0x8, @broadcast}, 0x10) 12:04:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x400, 0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xa48e, 0x0, @perf_config_ext, 0x0, 0xb2, 0x0, 0x0, 0x0, 0x3, 0x76}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000500)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000980)=0xe8) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000cc0)=[0x0, 0xee00, 0xffffffffffffffff, 0xee00, 0xee00]) getresgid(&(0x7f0000000d00)=0x0, &(0x7f0000000d40), &(0x7f0000000d80)) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000)={0x0, 0x0, 0x0}, &(0x7f0000001040)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000001080)=ANY=[@ANYBLOB="027d2800"/16, @ANYRES32=r1, @ANYBLOB="02000700", @ANYRES32=r2, @ANYBLOB="020024ef", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000000", @ANYRES32=r5, @ANYBLOB="02000300", @ANYRES32=r6, @ANYBLOB="02000600", @ANYRES32=r7, @ANYBLOB="02000400", @ANYRES32=r8, @ANYBLOB="02000200", @ANYRES32=r9, @ANYBLOB="040005000000000008000100", @ANYRES32=r10, @ANYBLOB="08000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="08000300", @ANYRES32=r16, @ANYBLOB="08000500", @ANYRES32=r17, @ANYBLOB="08000500", @ANYRES32=r18, @ANYBLOB="10000400000000002000010000000000"], 0xb4, 0x1) 12:04:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4283, 0x101000) getgroups(0x6, &(0x7f00000000c0)=[0xee01, 0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0x0]) getgroups(0x2, &(0x7f0000000400)=[0xffffffffffffffff, 0x0]) setregid(r1, r2) accept$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100080c2}, 0xc, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB="9c0100002c0000072dbd7000fcdbdf250000000014e1e919d4e8985ef39fa3fc47cd3b464c0ba2ed8d95041ab50c5f61c0a763c05a87101f8f4946399526735494cfd7016c5f1044c49cd0e3d078709b6394b2a1d6d01bfc3ad0435ea799f1f780a00dd356393831a0c40c1a24a6dfb3cad2c2bdd615328dd459fba27d83d5cf96183c105a2f25440ffa36b66f95a188588508ee691e207ba14d6a65b62109f75ac1998c5d2901cf4f98b8e88150c58cefc5041c321e86ddf96bdf9f01743e3ebea6a7beffb0963e3f6b550105d8c542", @ANYRES32=r3, @ANYBLOB="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"], 0x19c}, 0x1, 0x0, 0x0, 0x24040800}, 0x20000000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000900)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000009c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x1c, r5, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x1) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000600)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r4, 0x40505331, &(0x7f0000000580)={{0x2338, 0x7}, {0x100000001, 0x6b3bef83}, 0x3, 0x7, 0x8d4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) ioctl$KDMKTONE(r0, 0x4b30, 0x9) bind$llc(r0, &(0x7f0000000540)={0x1a, 0x200, 0xd7, 0x8, 0x1, 0x6, @local}, 0x10) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000500)=@get={0x1, &(0x7f0000000440)=""/134, 0x800}) 12:04:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x100) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080)=0x40, 0x4) 12:04:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0xffffffff, 0x0, "fe4977566bbd25dce8174dd4c8f703cbfada2ee93b9b17fc25a97ca16dfd99dd3e1bc3ec8dccdc4d9fd4acc7f347f71aa7f1784080d598ab6abafe6ebc95a53a41e5d13e475f2ec27a9e10eb2b8a792c"}, 0xd8) 12:04:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000080)={{0x73, @empty, 0x4e22, 0x1, 'dh\x00', 0x1d, 0x3, 0x61}, {@rand_addr=0x81, 0x4e23, 0x2003, 0x7, 0x4, 0x3f}}, 0x44) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:54 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x10000, 0x400082) mkdirat(r2, &(0x7f0000000000)='./file0\x00', 0x800001) preadv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/34, 0x22}, {&(0x7f0000000280)=""/169, 0xa9}], 0x2, 0x0) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'veth1_to_bridge\x00', 0x0}) connect$packet(r1, &(0x7f0000000480)={0x11, 0xff, r3, 0x1, 0x0, 0x6, @random="7f19ad85e3ba"}, 0x14) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:54 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x6000, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000100), &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000d516d091c27ba810f3ba9970e837b1e15433d9fb2204b3607cae9c5afc36d03887b495c48ccbcabbdad680f4923dbe07a1ad2b47330cf998c01dc6444016e25928dadbde0610e38324b0e34ef760fa38ccf4c2469c088db8992d94c44310dab10a9fc4f3ed787a247c4a31846971e75746f1d4a9a6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000100)) splice(r1, &(0x7f0000000040), r0, &(0x7f0000000300), 0x8001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:56 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080)=0x101, 0x4) 12:04:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000fff9a0ddd38a91e9ff0900000000000000000065040400010000000404070000007d60b7030000000000006a0a40fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xffffffffffff0001, 0x40802) sendto$rose(r1, &(0x7f0000000400)="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", 0x1000, 0x0, &(0x7f0000000100)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@default, @bcast, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x40) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x81, 0x80001) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000080)=0x5) 12:04:56 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000480)=0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x80, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0xffffffffbc39e681, 0x0, 0x100000000, 0x9, 0x0, 0x3, 0x40830, 0x4, 0x1, 0x401, 0x2ade, 0x1ff, 0x1ff, 0x6678, 0x7fff, 0x40, 0x1ff, 0x24f3, 0xfff, 0xe8, 0x6, 0x4, 0x5, 0x9, 0x401, 0x1, 0x6, 0x8, 0x4f42, 0x3, 0xff, 0x200, 0x1, 0x1, 0x9, 0xffffffffffffedf4, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000000100), 0xe}, 0x10, 0x4, 0x100000001, 0x8, 0x6, 0x20, 0x40}, r0, 0x4, r1, 0x9) r2 = gettid() r3 = perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0x5, 0x5, 0x7ff, 0xd1c, 0x0, 0x1, 0x100, 0x0, 0x1, 0x10000, 0x6, 0xfffffffffffffff8, 0x66f, 0x9, 0xce, 0x2, 0x2, 0x7, 0x8000, 0x6f8, 0x10001, 0x3, 0x7e4, 0x4, 0x6, 0x1, 0x3, 0x3, 0x9, 0xeb, 0x100000000000, 0x2d3, 0x7fff, 0x3, 0x6, 0x2, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x4000, 0x513a90f5, 0x1, 0x5, 0x3, 0x20, 0xfff}, 0xffffffffffffff9c, 0xc, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x9ae, 0x79, 0x0, 0x20, 0x0, 0x7fff, 0x80000, 0x9, 0x100, 0xfffffffffffffffb, 0x4, 0x6, 0x2, 0x4, 0x8, 0x3af8, 0x1f, 0x7, 0x4fbbb1f6, 0x7ff, 0x3, 0xff, 0x7, 0x3, 0x0, 0xfff, 0xea31, 0x80000000, 0x3ff, 0xdb6, 0xb8ca, 0x1ff, 0x1f, 0x400, 0x4, 0x20, 0x0, 0x3, 0x2, @perf_config_ext={0x6}, 0x0, 0x200, 0x1, 0x3, 0x1, 0x3, 0x9}, r2, 0xd, r3, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000000) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000040)={0x4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) 12:04:56 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x10000, 0x400082) mkdirat(r2, &(0x7f0000000000)='./file0\x00', 0x800001) preadv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/34, 0x22}, {&(0x7f0000000280)=""/169, 0xa9}], 0x2, 0x0) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'veth1_to_bridge\x00', 0x0}) connect$packet(r1, &(0x7f0000000480)={0x11, 0xff, r3, 0x1, 0x0, 0x6, @random="7f19ad85e3ba"}, 0x14) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000128d0065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000a140319bebe6a3d76134e019a135373377f493e25ad8a66ae063c0781ae37bb76bafc223983f341d96b77ba4b75ee0966a614605f9aad389befc6ff5d8d200454193fb316d9be21380007ad5205c88a608176ec4d9e27121c68089d0191c24d45000c1d393ed843a"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) syz_open_procfs(r1, &(0x7f0000000280)='cmdline\x00') r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f00000000c0)={0x1, 0x7, 0xfff, 0x50, 'syz1\x00', 0xcd8}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1800000000000060, 0xe, 0x1fa, &(0x7f0000000000)="db0703e6680d698cb89ecbf02cea", 0x0, 0x8}, 0x1b) 12:04:56 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x8, @local, 0x80}}, 0x5, 0x7}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r1, 0xa994, 0x2}, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d61b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fcntl$setsig(r0, 0xa, 0x2a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0x40, 0x1ff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x111001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000080)="49a02fffacc46a8173fabf96b515623950dcf96ae469a375de053a5acf6b83b7e443267db7", 0x25) 12:04:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000128d0065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000a140319bebe6a3d76134e019a135373377f493e25ad8a66ae063c0781ae37bb76bafc223983f341d96b77ba4b75ee0966a614605f9aad389befc6ff5d8d200454193fb316d9be21380007ad5205c88a608176ec4d9e27121c68089d0191c24d45000c1d393ed843a"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) syz_open_procfs(r1, &(0x7f0000000280)='cmdline\x00') r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f00000000c0)={0x1, 0x7, 0xfff, 0x50, 'syz1\x00', 0xcd8}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1800000000000060, 0xe, 0x1fa, &(0x7f0000000000)="db0703e6680d698cb89ecbf02cea", 0x0, 0x8}, 0x1b) 12:04:56 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) 12:04:59 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:04:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x100) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000400)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004004000bfa30000000000000703000000feffff7a0ac558834bffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe1b000000850000000d000000b700000000000000950000000000000048c6fe791ce66db819e80c2c7b80d1642a7c12db4f60a4f9a8e62aac2028c815c9320cfecb166ab5518a46992f5d906db760ce501f05fe0551a89fb693f4f2a2e78865bf86d52a22ca"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:59 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0x40, 0x1ff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x111001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000080)="49a02fffacc46a8173fabf96b515623950dcf96ae469a375de053a5acf6b83b7e443267db7", 0x25) 12:04:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$unix(0x1, 0x5, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:59 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) socketpair(0x1, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x80000) r7 = accept4$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000640)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000700)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'rose0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000023c0)=0x327) recvmmsg(r1, &(0x7f0000002600)=[{{&(0x7f0000000b00)=@nl=@unspec, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/70, 0x46}, {&(0x7f0000001c00)=""/123, 0x7b}], 0x3, &(0x7f0000001cc0)=""/230, 0xe6}, 0x7}, {{&(0x7f0000001dc0)=@nfc, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001e40)=""/84, 0x54}, {&(0x7f0000001ec0)=""/118, 0x76}], 0x2}, 0xfffffffffffffff8}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001f80)=""/79, 0x4f}, {&(0x7f0000002000)=""/254, 0xfe}], 0x2, &(0x7f0000002140)=""/131, 0x83}, 0x7}, {{&(0x7f0000002200)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000002280)=""/115, 0x73}, {&(0x7f0000002300)=""/158, 0x9e}, {&(0x7f00000023c0)}, {&(0x7f0000002400)=""/159, 0x9f}], 0x4, &(0x7f0000002500)=""/214, 0xd6}, 0x9}], 0x4, 0x20, &(0x7f0000002700)={0x77359400}) getsockname$packet(0xffffffffffffffff, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002780)=0x14) getpeername(0xffffffffffffff9c, &(0x7f00000027c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x80) getsockname$packet(r1, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000028c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002940)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000002a40)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002b80)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002bc0)={'vcan0\x00', 0x0}) getsockname(r7, &(0x7f0000000740)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000680)=0xfffffffffffffdce) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002cc0)={'veth1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002d40)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002d80)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000002e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003080)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000031c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000003200)={@remote, 0x0}, &(0x7f0000003240)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003280)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003340)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003480)={'bcsf0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006540)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000006640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000006880)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0x7b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000006b00)={{{@in6=@local, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@mcast1}}, &(0x7f0000006c00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000006c40)={{{@in6=@ipv4, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000006d40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000006d80)={@mcast2, 0x0}, &(0x7f0000006dc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000006e80)={@multicast1, @multicast2, 0x0}, &(0x7f0000006ec0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000006f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000007b80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000200}, 0xc, &(0x7f0000007b40)={&(0x7f0000006fc0)={0xb44, r4, 0x4, 0x70bd29, 0x25dfdbfc, {}, [{{0x8, 0x1, r5}, {0xac, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r6}, {0x160, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2ba}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r9}, {0x1b0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x264, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r21}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r22}}}]}}, {{0x8, 0x1, r23}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x32c}}}]}}, {{0x8, 0x1, r24}, {0xec, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffb}}}]}}, {{0x8, 0x1, r27}, {0x128, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r31}}}]}}, {{0x8, 0x1, r32}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r33}, {0x1f0, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r35}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r37}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x97}}, {0x8, 0x6, r38}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r39}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r40}}}]}}]}, 0xb44}, 0x1, 0x0, 0x0, 0x10}, 0x0) 12:04:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL_GET(0x22) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0x30a, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0xffffffffffffff73, &(0x7f0000000000)="b90703e6680d648cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000080)='syzkaller\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext}, r1, 0x0, r0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:04:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat6\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/25, 0x19}], 0x1, 0x0) 12:04:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000008bf0a853ae3cef1aad9b5aba9bbee300000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x1800000000000060, 0x7d, 0x0, &(0x7f00000000c0)="b90703e6680d698cb89e40f02cea1ad231f89afcac5d5c04b44e1f51c6817b99756241f4b9b18639b749aa23466c49010036716b6afe58b685dbd7bb4ddb5492ec60e9839767d1ecdd2a1c453cb66ce564d5e7c0c90f8dfca63ca0b0b749226c5e9de774115c845d313d095e4087a3fb607feeb7fc7dde0a0000000000", 0x0, 0x4}, 0xffffffffffffffd0) 12:04:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:02 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20100, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000080)={0x1, @dev={[], 0x13}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x80000) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x3}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:02 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000040)={0xffff, 0x0, 0x301f, 0x6, 0x9, 0x5, 0x80000000, 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x100000001, 0x400, 0x0, 0xaa2c, 0xffff, 0xfffffffffffffff8, 0x100, {0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x3, 0x3, 0x200, 0x0, 0x800}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0xdf1, 0x8000, 0xab, 0x8001, r3}, &(0x7f0000000300)=0x10) 12:05:02 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'raw\x00', 0x80, "310090f087dc5433f7467b905b0a1bc6a7daab641885a3c43dee6a7a4dbc65cf242cd7aec3550ba15ecb048dacf5a763b9459845907fd45aa1cd8d2a168c4056cb5b453750fdde1a055e1cd8a570eca41f8b0f44bea9eacf92c1e409777e294db688e8de33330d89973730da4e6263be8e135ac4b2aaf7ebd90d09e074b5bab0"}, &(0x7f0000000240)=0xa4) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@empty, @in, 0x0, 0x6, 0x4e22, 0x4, 0x0, 0x20, 0x80, 0x4, 0x0, r3}, {0x0, 0x159, 0x0, 0x80000000, 0x5a, 0x0, 0x3, 0x5}, {0x1, 0x1, 0x101, 0x1}, 0x0, 0x0, 0x2}, {{@in6=@empty, 0x4d2}, 0x2, @in=@rand_addr=0x100000001, 0x3507, 0x2, 0x3, 0x0, 0x5, 0xffff}}, 0xe8) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) 12:05:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1800000000000060, 0x1c5d5f7b5c89d1c3, 0xfffffffffffffec4, &(0x7f00000000c0)="f906dfe568fa", 0x0, 0xfe}, 0x28) 12:05:02 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) set_tid_address(&(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x40000}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:02 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x6, 0x10, 0x7fff, 0x4}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1, 0x1000}, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:02 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200440, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = getpgrp(0xffffffffffffffff) getpgrp(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:02 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) fchdir(r0) 12:05:03 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) accept4$inet(r0, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000400)=0x10, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@delrng={0x10, 0x14, 0x8, 0x70bd29, 0x25dfdbfb, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x4080) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x21c, 0x0, &(0x7f0000000100)="b90703e6680d698cb89e40f02cea", 0x0, 0xc00000000000}, 0x28) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000480)={0x80, 0x10, &(0x7f0000000440)="c236cec5a02e4a6ece460de4d69bbbfd5192f3a921212b", {0x3, 0x80000000, 0x303c705f, 0x0, 0x3, 0x7, 0xd, 0x8}}) 12:05:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaf666fa1cd6e824d89aaaaaaaaa5dffffffffffffff2c0000000000019078ac141400ac1423bb860300000e0090780000000080"], 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ff2000002e64050000357b207b000000650404008ac1013c9393871101007d60b7030000000000006a0a01fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000000c0)={0x0, @aes256, 0x2, "79436edb76f76f92"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) fcntl$setstatus(r0, 0x4, 0x800) 12:05:05 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x0, 0xee1}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000000c0)={0x7a, r1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x101, 0x20000) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x80, 0x10002) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xd7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000100)={r1, 0xfffffffffffffe80}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000076c91b6e06a34f00000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095da1ed94d84ea757ba91cf3470f7137bc2129c9e921f04df598f76d2b6988d5fe2508d6eb96b927620d015808c4f8a50543c0c53c0599769c1286e95331b1e686f6ffec6c3f358b525401ebe43cd374fed72d4ece5a48f15c4dbaf31078ab64aa9fc6483a8da690f8a6fd6d1010bb78a005d99fd2e5c61c5d3c33e8bf580b043f8cb97f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:05 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'raw\x00', 0x80, "310090f087dc5433f7467b905b0a1bc6a7daab641885a3c43dee6a7a4dbc65cf242cd7aec3550ba15ecb048dacf5a763b9459845907fd45aa1cd8d2a168c4056cb5b453750fdde1a055e1cd8a570eca41f8b0f44bea9eacf92c1e409777e294db688e8de33330d89973730da4e6263be8e135ac4b2aaf7ebd90d09e074b5bab0"}, &(0x7f0000000240)=0xa4) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@empty, @in, 0x0, 0x6, 0x4e22, 0x4, 0x0, 0x20, 0x80, 0x4, 0x0, r3}, {0x0, 0x159, 0x0, 0x80000000, 0x5a, 0x0, 0x3, 0x5}, {0x1, 0x1, 0x101, 0x1}, 0x0, 0x0, 0x2}, {{@in6=@empty, 0x4d2}, 0x2, @in=@rand_addr=0x100000001, 0x3507, 0x2, 0x3, 0x0, 0x5, 0xffff}}, 0xe8) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) 12:05:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ff13e0ff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:05 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0xa00) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x4, 'syz0\x00', @bcast, 0x6, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYRES32=r1], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000400)=""/148, &(0x7f00000002c0)=0x94) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000100)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f00000000c0)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7afeefe0f2b8621d921f4ce1b6e04e25d80af0fff8ffffff79a4f0ff00000000b7060000ffffffff2dac970000000000650f04030000000000006a0a00fe142414c598c0b65c11bb2fa500000000850000000d000000b70000000022000095000097215d2b94eaf3c4745592b26db3f9d171ac0300"/154], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x7, 0x80402) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000400)={0xbb, "40417c5f9e004423905b8d82791e239631aa0fd5a3942057b67797d75a9679573aa979583798c702081fa74d84d1afb3133b886184288114a9458e590572374552783a165cd1a78c053219750e472e93cedbd8a3c72619fb88fe54e8462160f87c6f0ff236e6fb540547483bb74259cbbc23db6285dc6181241a002a34f1680681c92bd15461b5494e6e89b5b4bab909d2ec68e9858874213ef9b16c169dcd69cfa120511031b61f1c660c9342adbcdd5ce8066959afbb847f3382"}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000080)={{0x4, 0xfffffffffffffffa}, 'port0\x00', 0x4, 0x1000, 0x100000000, 0x3ff, 0x81, 0x2, 0x14, 0x0, 0x4, 0x4}) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x84b) [ 706.724756] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 706.757276] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 12:05:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x2902c90e4d4fba8d, &(0x7f0000000000)="b90709e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = getpgrp(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000400)={{0x4, 0x4, 0x6, 0x3}, 0x4, 0x27b, 0x80, r1, 0x7, 0x40, 'syz0\x00', &(0x7f00000000c0)=['task\x00', 'mime_type^eth0(.cgroup\x00', 'syzkaller\x00', 'syzkaller\x00', '\x00', '#procsecurity\x00', 'syzkaller\x00'], 0x49, [], [0x2, 0x400, 0x5, 0x8001]}) syz_open_procfs(r1, &(0x7f0000000040)='task\x00') [ 706.805972] FAT-fs (loop3): Filesystem has been set read-only [ 706.825622] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 706.925929] Unknown ioctl 1084773155 12:05:06 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'raw\x00', 0x80, "310090f087dc5433f7467b905b0a1bc6a7daab641885a3c43dee6a7a4dbc65cf242cd7aec3550ba15ecb048dacf5a763b9459845907fd45aa1cd8d2a168c4056cb5b453750fdde1a055e1cd8a570eca41f8b0f44bea9eacf92c1e409777e294db688e8de33330d89973730da4e6263be8e135ac4b2aaf7ebd90d09e074b5bab0"}, &(0x7f0000000240)=0xa4) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@empty, @in, 0x0, 0x6, 0x4e22, 0x4, 0x0, 0x20, 0x80, 0x4, 0x0, r3}, {0x0, 0x159, 0x0, 0x80000000, 0x5a, 0x0, 0x3, 0x5}, {0x1, 0x1, 0x101, 0x1}, 0x0, 0x0, 0x2}, {{@in6=@empty, 0x4d2}, 0x2, @in=@rand_addr=0x100000001, 0x3507, 0x2, 0x3, 0x0, 0x5, 0xffff}}, 0xe8) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) [ 706.952351] Unknown ioctl 43786 [ 707.207801] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 707.216202] FAT-fs (loop3): Filesystem has been set read-only [ 707.224662] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 707.232972] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 707.243942] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 707.498213] FAT-fs (loop3): error, fat_get_cluster: detected the cluster chain loop (i_pos 0) [ 707.550506] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 12:05:08 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000400)={0x8001, 0x3, 0x1, 0x1, 0x6, [{0x1, 0x9, 0x8, 0x0, 0x0, 0x81}, {0x9, 0x722, 0x0, 0x0, 0x0, 0xb00}, {0x8, 0x6, 0xe7, 0x0, 0x0, 0x1000}, {0x8001, 0x2, 0xb2c3, 0x0, 0x0, 0x80}, {0x2, 0x1, 0xb34, 0x0, 0x0, 0x2402}, {0x85, 0x6, 0x1ff, 0x0, 0x0, 0x100}]}) 12:05:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1800000000000060, 0xe, 0xffffffffffffff79, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100000000000100}, 0x28) 12:05:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0}, 0x28) 12:05:08 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710, @hyper}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="d030eea8c0839586dca4a75d76b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a42d6405000000000065040400010000000404000001007d60b7030000000000009f362b9000000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:08 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'raw\x00', 0x80, "310090f087dc5433f7467b905b0a1bc6a7daab641885a3c43dee6a7a4dbc65cf242cd7aec3550ba15ecb048dacf5a763b9459845907fd45aa1cd8d2a168c4056cb5b453750fdde1a055e1cd8a570eca41f8b0f44bea9eacf92c1e409777e294db688e8de33330d89973730da4e6263be8e135ac4b2aaf7ebd90d09e074b5bab0"}, &(0x7f0000000240)=0xa4) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@empty, @in, 0x0, 0x6, 0x4e22, 0x4, 0x0, 0x20, 0x80, 0x4, 0x0, r3}, {0x0, 0x159, 0x0, 0x80000000, 0x5a, 0x0, 0x3, 0x5}, {0x1, 0x1, 0x101, 0x1}, 0x0, 0x0, 0x2}, {{@in6=@empty, 0x4d2}, 0x2, @in=@rand_addr=0x100000001, 0x3507, 0x2, 0x3, 0x0, 0x5, 0xffff}}, 0xe8) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) 12:05:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team_slave_0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) getpeername(0xffffffffffffff9c, &(0x7f0000000880)=@can={0x1d, 0x0}, &(0x7f0000000900)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000c40)={@mcast1, 0x0}, &(0x7f0000000c80)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000fc0)={'veth1_to_bridge\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000001100)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001280)={'rose0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001a40)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001a00)={&(0x7f00000012c0)={0x718, r1, 0x100, 0x70bd29, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x100, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0x24c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x80, 0x3ff, 0x1f, 0x7}, {0x8, 0x3, 0xd97, 0xd57}, {0x7fff, 0x9, 0x401, 0x40}, {0x100, 0xffffffffffffffc1, 0x5, 0x20}, {0x400, 0x24, 0x200, 0x8}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r8}, {0x178, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x40, 0x5, 0x7, 0xa3}, {0x0, 0x6, 0x2f, 0xaff4}, {0x3, 0x7, 0x8, 0x23b}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}]}}, {{0x8, 0x1, r10}, {0x220, 0x2, [{0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x617}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}]}, 0x718}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x80001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r14, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:08 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x2, 0x33, &(0x7f0000000080)="6c77818c3ff26c9d1226d67da939260a10c970c742e54675d83aa06615e310adf6e72ed78e581e58af684a735d67e552f07308"}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r1, 0xc10, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xf, 0xde5, @l2={'ib', 0x3a, 'bridge0\x00'}}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000440)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703080000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b30300000000000004000000000000000000000000000000b7004000080000009500040000000000428f83c40a3e4e7c291e651d45b44aa523c9f74d75dfebe958f7ffb03b5619ebd71c3bdae70fb9cbcc12417fde8f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0x7ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 709.772770] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 709.804474] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 12:05:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000fefff97a0af0fff8ddffff79a4f0ff000000001116b709ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x20, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x40800}, 0x8000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 709.845714] FAT-fs (loop3): Filesystem has been set read-only [ 709.857598] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 12:05:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:11 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x800000008000000, 0x511800) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x30000, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) 12:05:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:11 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'raw\x00', 0x80, "310090f087dc5433f7467b905b0a1bc6a7daab641885a3c43dee6a7a4dbc65cf242cd7aec3550ba15ecb048dacf5a763b9459845907fd45aa1cd8d2a168c4056cb5b453750fdde1a055e1cd8a570eca41f8b0f44bea9eacf92c1e409777e294db688e8de33330d89973730da4e6263be8e135ac4b2aaf7ebd90d09e074b5bab0"}, &(0x7f0000000240)=0xa4) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@empty, @in, 0x0, 0x6, 0x4e22, 0x4, 0x0, 0x20, 0x80, 0x4, 0x0, r3}, {0x0, 0x159, 0x0, 0x80000000, 0x5a, 0x0, 0x3, 0x5}, {0x1, 0x1, 0x101, 0x1}, 0x0, 0x0, 0x2}, {{@in6=@empty, 0x4d2}, 0x2, @in=@rand_addr=0x100000001, 0x3507, 0x2, 0x3, 0x0, 0x5, 0xffff}}, 0xe8) 12:05:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0xfffffffffffffcf7) 12:05:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 12:05:11 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U+', 0x9}, 0x28, 0x3) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000002c0)={0x3c, "1c7a0182ccb67f8fd8d537336cf6872d110ba467507cb07ff8dec6a6ccb090fc", 0x0, 0x20, 0x101, 0x40, 0x0, 0x7, 0x8001, 0x6}) 12:05:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0xfffffffffffffffe, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r3 = dup2(r0, r2) mknodat(r3, &(0x7f0000000040)='./file0\x00', 0x8000, 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x80, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000280)={0x9, 0x3, {0x2, 0x3, 0xacd, 0x1, 0x3}}) socket$inet_udplite(0x2, 0x2, 0x88) clock_nanosleep(0x7, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000200)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00'}) [ 712.790364] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 712.798239] FAT-fs (loop3): Filesystem has been set read-only [ 712.813402] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 712.823444] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 12:05:11 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'raw\x00', 0x80, "310090f087dc5433f7467b905b0a1bc6a7daab641885a3c43dee6a7a4dbc65cf242cd7aec3550ba15ecb048dacf5a763b9459845907fd45aa1cd8d2a168c4056cb5b453750fdde1a055e1cd8a570eca41f8b0f44bea9eacf92c1e409777e294db688e8de33330d89973730da4e6263be8e135ac4b2aaf7ebd90d09e074b5bab0"}, &(0x7f0000000240)=0xa4) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000580)) 12:05:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000200)={0xf, 0x7fffffff, {0x56, 0x3, 0x2, {0x5, 0x1000}, {0x9}, @ramp={0x200, 0x8, {0x6, 0x6, 0xffffffffffffffff}}}, {0x54, 0x1, 0x0, {0x7, 0xc0000000020}, {0x4, 0x3}, @ramp={0x1, 0xffff, {0x7f, 0x80000001, 0x8, 0x3}}}}) [ 713.172317] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 713.175490] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 713.194005] FAT-fs (loop3): Filesystem has been set read-only [ 713.206938] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 713.218035] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 713.226536] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 713.290480] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 12:05:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:14 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:14 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000080)={{0x9, 0x32}, 'port1\x00', 0x1, 0x2000a, 0x8d, 0x3, 0x5, 0x7ff, 0x7fff, 0x0, 0x4, 0x5}) r2 = dup2(r0, r0) ioctl$KVM_NMI(r2, 0xae9a) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000080)=0xa46, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x400000) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000100)={0x0, @dev, @dev}, &(0x7f0000000280)=0xc) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000002c0)={@loopback, r1}, 0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:14 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'raw\x00', 0x80, "310090f087dc5433f7467b905b0a1bc6a7daab641885a3c43dee6a7a4dbc65cf242cd7aec3550ba15ecb048dacf5a763b9459845907fd45aa1cd8d2a168c4056cb5b453750fdde1a055e1cd8a570eca41f8b0f44bea9eacf92c1e409777e294db688e8de33330d89973730da4e6263be8e135ac4b2aaf7ebd90d09e074b5bab0"}, &(0x7f0000000240)=0xa4) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) [ 715.891232] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 715.902455] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 12:05:15 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x400100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1f, 0x8, &(0x7f0000000040)=@raw=[@ldst={0x3, 0x2, 0x3, 0xf, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x0, 0x3, 0x7, 0x7, 0x20}, @generic={0x3, 0x4, 0x6, 0xffffffffffffffff, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, @generic={0x40, 0x0, 0xca2b, 0x3, 0x7fff}, @ldst={0x0, 0x0, 0x3, 0xf, 0x8, 0xffffffffffffffc0, 0x5}, @alu={0x4, 0x800, 0xf, 0x9, 0x9dd0205864973a44, 0xfffffffffffffffe, 0x8}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x11, &(0x7f00000000c0)=""/17, 0x41f00, 0x1, [], r2, 0x0, r3, 0x8, &(0x7f0000000300)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x3, 0x1eb817fc, 0xff}, 0x10}, 0x70) [ 715.934065] FAT-fs (loop3): Filesystem has been set read-only [ 715.951516] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 12:05:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x40, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:15 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'raw\x00', 0x80, "310090f087dc5433f7467b905b0a1bc6a7daab641885a3c43dee6a7a4dbc65cf242cd7aec3550ba15ecb048dacf5a763b9459845907fd45aa1cd8d2a168c4056cb5b453750fdde1a055e1cd8a570eca41f8b0f44bea9eacf92c1e409777e294db688e8de33330d89973730da4e6263be8e135ac4b2aaf7ebd90d09e074b5bab0"}, &(0x7f0000000240)=0xa4) 12:05:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b70200000400ec5b093dbbaa0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d8cd9d96405000000000065040400010000000404000001007d60b7030000000000000200000000000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:15 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x4200) r2 = fcntl$getown(r0, 0x9) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000400)={{0x0, 0x5, 0x9, 0x1, '\x00', 0x7}, 0x5, 0x20000004, 0x2, r2, 0x1, 0x1, 'syz0\x00', &(0x7f0000000080)=['syzkaller\x00'], 0xa, [], [0xe2, 0x10000, 0x100, 0xfffffffffffffffe]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = geteuid() ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703040000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ff7fffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sysinfo(&(0x7f0000000040)=""/180) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x81, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000400)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x705f80, 0x0) ioctl$KVM_REINJECT_CONTROL(r3, 0xae71, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) socket$unix(0x1, 0x0, 0x0) 12:05:15 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0xdd, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:17 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000400)={[], 0x3f, 0x1000, 0x6, 0x0, 0x10000, 0x6000, 0x7000}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000008bfa3000000000000ff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x90200, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) 12:05:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r1, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/ip6_mr_cache\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000002c0)={0x80000000}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065090400010000000404000001007d60b7034bb4af8e030498b3a989b95e0000000000006a0a00fe0000000085009500"/124], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000ffff00000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x5, 0x800, 0x4, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x1, @bcast, @rose={'rose', 0x0}, 0x6, 'syz1\x00', @bcast, 0x3, 0x0, [@bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x80) getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) 12:05:17 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 12:05:17 executing program 4: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:17 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYRES16=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xbd, 0x0, 0x41100, 0x0, [], r1}, 0x26) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000280)={0x73622a85, 0xa, 0x2}) write$P9_RRENAMEAT(r3, &(0x7f0000000100)={0x7, 0x4b, 0x1}, 0x7) ioctl$KDSKBLED(r3, 0x4b65, 0x7) 12:05:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:18 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = dup3(r0, r1, 0x80000) ioctl$TIOCSTI(r2, 0x5412, 0x7f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x2e, 0x1cb, &(0x7f00000006c0)="b98703e6683b09952c457edb9228b7825a4e95aa43eebd060062d3d8e1929817f82cea2e0aee70cbcff4", 0x0, 0xed7}, 0x28) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) fcntl$getownex(r2, 0x10, &(0x7f0000000d80)={0x0, 0x0}) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00)=0x0, &(0x7f0000000e40)) r7 = gettid() r8 = getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000002080)=0x0) getresgid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)=0x0) r11 = getpid() r12 = getegid() ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000002180)=0x0) r14 = getegid() sendmmsg$unix(r2, &(0x7f0000002280)=[{&(0x7f0000000580)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000600)="1c703cf1a76e1af3efc46f56f8db40df029857ef961f04c0e0ab09fc2587c8453d4f2f4ef83dc09d4b1a033cef949fdbad7a679ce0bb3f2482179c6016d7a0503427e829860e8f8a2e4625991df01e77031072b9677a048bbe9543ace5dac5d26859e2fb97a56c271b7d0af461", 0x6d}, {&(0x7f0000000680)="68d5fa630c6615410bfb359f44218e9eaa843b033086aa", 0x17}], 0x2}, {&(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000cc0)=[{&(0x7f00000007c0)="09dff2ad2195ff01d7a7695155f3bbf2e4fb2e4837e4797f85a666145b0c", 0x1e}, {&(0x7f0000000800)="a066e10aec9e143dbf901c09f9cb60c3c3869f65189cd9186a2198c72087216ba08ffae60d0281d22e89ff9a9df3bfd3ef2e3d113a03eccff6a5bfc8bf35bf802614fdf54073a220503a6d8f738e1e88a1c5a9994b78bec49f7d999cc7534f54c75d3ece90875b4f8cf6a28251fa5181f730c00d173406e1bb817c19f3c2601a28fb4265dc243de7157d6b87d79367d2f03f30", 0x93}, {&(0x7f00000008c0)="4bb1c15746e87184c337b6bb5ddd4b647dbe4159a906bbc0e8b07603ae6592ee6b79da79ac79162cdecf1238d5cc1b74d87ae16b21c7934d5d5605cbd5074d32257ff56167d4b41b5cd933f86a25fb7bdb76924b", 0x54}, {&(0x7f0000000940)="e00f097763222fdbd9b0cf1565deb3d84ad21b76431068136139b2c3232fffd1dba776b45e405b1157df6aaddadc4bcc26661fc35ac1a9fb44e136f3fc4a504a6ad6b615e33e434296309a6539fe47806aa78ec7001686375765bc64d36a76333dbbb338a546daacebdf8edb46969a", 0x6f}, {&(0x7f00000009c0)="f20f39b6d4b10b227baf56a1862772afa26a8b5add4b63017db58149b9476e475c69edd22e005595c481a7c0557e221d448d1df0cf9ca018cfec9fba4eb1a6fefd671406f66d41c488a368c560db6148328eae979ebc4efcd5aed878aec69c6cf1ad9b8b77abd03d9bc7d3b76c166246e20c02cc74a7c8ef3f16c22760eb1664fab71ca3755781590ea87c6ff75ee362817251e8899cff8c4e30fac6f2", 0x9d}, {&(0x7f0000000a80)="52b55d3ee702433393cbad0b4adaf3c8dd0fd708867f7c373415cf894440ddd7dc15f880cff9bcdb1a6ede60868bd7e85977bda2c3016e8b67e0fbc94d696873b5a9c305d442436ed804b78ff103724ea2bd0f37fb00b7dd0c22782e768e9bd15b191ab03379c1299e1ff84f8f65138d6178af9fce", 0x75}, {&(0x7f0000000b00)="8c9c481ec10e48dd4f31657168e0cd363007b41ce6ac0741378aa7ff0c31ec258c6940", 0x23}, {&(0x7f0000000b40)="3ea243598a1230433fc1680a592e2dddcf2f9fc310ad516f2c0663063d048db42bb60f8fcc7d2826189d89cb505acaa8181d64216da9a3acb1b2f81d44edaa2f777c6ede4e67a999e5b004bd8249fff452e8553ae71cc8c9a3331b65ee64e17b221b183cd02e34ee1abdcea7da0081b3c7ddec5664c2d0d66ebd0d0c77262177b9c2db15e5a324fb58f618", 0x8b}, {&(0x7f0000000c00)="1c929e34dda8eaffcd021f3bd17cd6b215a2e7b01c51e2e29e3fdce51db3cd4f382e7872eb18cbf2e1aef313833de26a683cd68ec4e6cd784a5d3a69a12f52780052361186ba5a75c28b582cd779fc431bb6cb3251bb39599a1352c01789e798682ce4fef33370a8b4ff11679c6a05fc9c5154950937a12e366497a9895fd4b7a3bd46f1dbe9a065bf1c22ce9caea1f3e1f87ac13ed8", 0x96}], 0x9, &(0x7f0000000e80)=[@rights={{0x34, 0x1, 0x1, [r0, r1, r0, r1, r0, r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, r4, r6}}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r2, r2]}}], 0x78, 0x1}, {&(0x7f0000000f00)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000f80)="980ddbc8978232f699ebf94b60574f5b2de44debcd11f90468236d3a6b7e9ecb2b161779c02e66a3cb284856b3f525e186de30482c455c05b39e9bef54f7c7946e7f71b897b9de2a12267e3b2a6f7e67739ab5da82cef39e24aa0e5efd5a099ebaa113523401d19f99a7b63945ebf76de96b53faf7ff0f9ff653186f9c2eee42a3cb028e4a463e8fa20bf599d3de8145c1ee95fd3059f485dc3aee774956ea801e44fdd969d273ddb400850c538b96c2599d0727fbb7a97a27ff2e5000ce961ecee074115d24a96f9015949eff61430b1abff6d2a5aecad592146117924db610f2331387b9036bf9d3e5", 0xea}, {&(0x7f0000001080)="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", 0xfc}, {&(0x7f0000001180)="76eedf5dc6acdbd7b3b96839196ecf210c88be997380cfc7a4222155c3d5cf95da7dca9687ad0562393a616f0bb8483c49d6a6e53993cd611f6d7e256bb514b19f1eb82858fa", 0x46}, {&(0x7f0000001200)="100d89bde3796386f14588c840f279e01992afce1703697ac89c6d67cf563b93ee619beebdabdd8a003ae8cb88d74d8a081ff1fd010672d65788bc9e85da3e7ae82a1fc727b1f9709c086204d3e72f91f106466bd408269e3fd564ea22707a03be39893bffcc7588818ed7d7558bb5336cc88f77949890dad9c5a947d2146da80d854ad1e6f771a11bfa634caafa609712354f1a8721b519b8c08669b2bd9b02d3ec02929ccd3d8b75a7080ba9bbff72f3ab0da6411288d8df6044003ec79143a82305c502e2d89c606ffea1c48645a927971c399f7b22aca34a17377aa8cb7e4d9d4854f226cf63719b9877fcbe6387e2", 0xf1}, {&(0x7f0000001300)="9f57479e8de2c1a430657310e9421039cccda7ff552faa5b6c8278265c09e16e342776fa8911ba438541dcaac055158ac74887f19a1ca9952f9cc45047f08e150b0238d1ba9d293d5cad9ed95f236cc5d0171a9cd2daff4f7137a887aefc47c4bbc3205309f8a234f5ece3a288359667f8df30af0222c3f74079db1f02dd1a52be3edfc4", 0x84}, {&(0x7f00000013c0)="e68d5d61de8b7fcf4a8913a1bc6994fe98b73a04935eb140c05fd7f4add80ab6d1bb0d86c31256c1018d303ca9f7c3b1aeb77020cfd87050deb32d", 0x3b}, {&(0x7f0000001400)="cd8bdb29244a9dee44c16a0cac6de70e8c7d7fea17e17868cffb9e3949f534460c06a6cd5ac8db5f996804aacd3b7449a1a9dbda7d6c188a8d20a7f54fad34c8b043c52b28737ff27df66b3a99b563219f8b8a051a19113975567bc8134395deb3f557364336318e9623503e5634feb823843a134ce6fecc1519ea595c2305bb31a4569a92d5ffb1b7fb465e484c0e789fd7bc0bbecc0b57848f21da82b73954fa32f90e9328b89537ba2b3e1f49129891c0e2266eccfd353704ae6b6159f94c7089924d7c0dca809dcbd7fe9cc8e0fec10ac4bddbe869fe7d7cd050fbeaf94425338373f6b4ecbd7d786772584790b53a0f89", 0xf3}, {&(0x7f0000001500)="77ca58c1950ab4ce7c7e5caed41e3273de0961ac4fab28b609c5caa5e067de57b7657ebb55039c8747adb8d44f9358bfeefdb2a1e195aaeb112faa58b1a12df1da11afb4ef2660e6f435cf0b5b98768040058c20bd7532da23dcd1bbec812a9a672a0024377ec37194c466a0c952965ec1353f3b585ea0b0a405dd55badd7bed5dc9aacfc2cb6103d748d05affe3dfcb349b156a0b1029c094a153a8a014fe", 0x9f}, {&(0x7f00000015c0)="a33c9b9da6e6d9f1394407217eceb64d68bd5cee81810d68ff569e7c86b985c177a6ef52b519d22352d5452402198d524bc1cbf7f353f415f505b92f11cc55ba0eb3d7da366e827d27ff67715bb5478d6a434de86b97bcd34375a5ba1b7d62e90542342a92ab5189586f04759c8d27ad61bfba743b64d19e4254ee4efa5175bc23b36a8e8aed8f4801b0323ec8bde33634c84469a458f1dcab508c8997eb1d9f3e7300b88958c31be5", 0xa9}], 0x9, &(0x7f0000001740)=[@cred={{0x1c, 0x1, 0x2, {r7, r4, r8}}}, @rights={{0x14, 0x1, 0x1, [r2]}}], 0x38, 0x1}, {&(0x7f0000001780)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001800)="c79130dd74a253d4f6b00b832214a5", 0xf}, {&(0x7f0000001840)="31af7a9006d64c78f2ab357c50f855c1bcbc5f5abe5e8845e419d3c8877d0c36a00f7635530908797cc449223b90082ba3e3856f321760c05d578ce2b2b8481be5c7e44587b3d2f6a88de8920a01e5a36c351b281bf80e25b94ca04b05117d0db655111f2745e62255e30a253d660ccc1c8c1dd09fa4ecb6063d8338e3d4139aa430815374a543e2493a96734299c25fb10f2b1cce34b14127d5a16b5cc4d21387fbb107576bec5153c56d0e2631bb60b305193f539e9d160f2fc4823e84a89b18a5e659001a0efd2b6f35ff5e9fba5cf367bcf6eedf873a65bb9cf53e974fba5ca516fca0063098964813c368832d0766416ecd6c3458", 0xf7}, {&(0x7f0000001940)="79e2a0220c793211721f8d6503a009bd254f068068fdab20d6da77fb0b1b834d44acfd90fde1e179329235e23a5a00d19bfe62efa80c5ad78d3aa6e8cd6e194616e080fcc54866fc412620d61c3d15183408cf0f81f2eba79345485efca251a770c75d3e9dfa0d774644e9af9962cd59619e65bdba214a51f3b806013620665d0589f3f3b4748a797b9f51ac0ceb0da5", 0x90}, {&(0x7f0000001a00)="68958a409483366d47c896b88f5f998ccfec0d217d071e6fc34aa646e104b337b17fe1c75ed6e876dae81450ba37c9c36ebe26a301ee85d70f71e18cb4e9e000a16eadde4cd0790451a3666c2fe5d28d864d1b1caddcf75bbf7eca8e540a9647b453726dc734a1e9304e3149c986dc814bba62d0abaa13265d100489821a10cdbec24bed33cafc775081e91c1d7c4d3f0ab23aaeee4039e355b2f2984618fdf15641534db5642ffc03d3a206e6e267c6ec9a93788bbb79e427090f54a4274aef478ef625da9e95fa168728c1382cda5f1c07b3a265389a1b95d6ee4e8724c1bfb30059b76cd205a271f57e7ca122e91b71f4", 0xf2}], 0x4, &(0x7f0000001b40)=[@rights={{0x30, 0x1, 0x1, [r2, r0, r1, r2, r0, r2, r1, r2]}}], 0x30, 0x4000044}, {&(0x7f0000001b80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001dc0)=[{&(0x7f0000001c00)="03f3e72c09c4b5bf3537d87efd2d5dfc3ef75bdf7430d03bdbb2c1d18d29c3c6781f0fedccb4133b12de5fa0451e4834eda002a3276c50e5fe2b47caab2b0c01a69f30c0665b1ac8db6d1fcf8b0cd581a2f7b7d7ad0e3dac6e68e9eafeb2c37420334e045995765adbf1d38ccb17854eac58521cdaecfa66a5a16be52f196b9018ad343c569440109ef863b105362c9c6aea1aa94aebf4f400d5e75827ad3d5fffa0cd87c76dfcc1c10798f92bfbfeb790e5e687325bc719b2d37840af9526b05a3b93332252bd95e2d3e9ff07e7ddcbf54f18a085d8c37e4f32bdfa2d2e8f7d94f9fb91ff3ddf44", 0xe8}, {&(0x7f0000001d00)="360984d4f0828277a2577b442d7022e56a2268e6e28e19946880a9386c80d08a818fd2b0e1b65d548591c77fd709862a9084ff637d639bfde5d368e445c5542d61233936aed31dd91ae0354a9e7ba661950e8ce7deed7d009c2ff7585e067b3365396e75b34887a3e4f718dafc8f3944074565f5e9d15c2e809b1ccc634f6f566ec20e23a400d51c2e04fa03243827c14c911dbaebbbdc3d24a9", 0x9a}], 0x2, 0x0, 0x0, 0x4000000}, {&(0x7f0000001e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002040)=[{&(0x7f0000001e80)="3371f72a96a656c4ac80fb7e85be41e882bbde55863047aff4d295717b7ce7d4ae6133c73d0d02c8a114b12405471849a0539024789410e2973719fc0bbb7fd2db318067717257f6daee37df54379ed13820468047ccd56960f23030200bfdb1bbaf52027482f7d0d65b7f85b73fd531153e552833a99123eda2902400c72e5e587f3da103bbda07c90d705293791762131a3effcf883d9dd53ddb19d5a6a1f16da445dd1bbac5f0a0806b7f4ec958018d9f6a36a169b1a14321567cb85779a62fb4ada9add70f3367b84235a26233e12d3ca3b06b57a8161041e49885d49cc410c3e9e31735", 0xe6}, {&(0x7f0000001f80)="c8076bd952a88cbd7f6590fa453842ca1d298e4cf03ed54f2d1e269fd3c3219e36b81171b627569d0b1e05684214bfad977ead42f9de7436861473cbe00b3883819dacf6c9284027ca3c20c2a3b3a3338643cb8f9560c67eddaa256589320846493d5029a7256aed857c6b5b65732dde3315e41db3373f9fbfe8b47d088ddd025a1e2b2fd89ce29842e2adc98e35cb48160a14ac689910", 0x97}], 0x2, &(0x7f0000002440)=ANY=[@ANYBLOB="1c0021be20fa0000010000000000000091658b0f77ef1833facf12bb66e184047e4c749c5ad826062296c63263c5b4ce7f4962b60e190899354be472d5878e59dbe4b01312b2291fadd9b19aa25e9cb9fa7d146e", @ANYRES32=r9, @ANYRES32=r4, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r4, @ANYRES32=r12, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r4, @ANYRES32=r14, @ANYBLOB='\x00\x00\x00\x00'], 0xa8, 0x80}], 0x6, 0x20004000) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x12, 0x3, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0xf}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000080)='GPL\x00', 0x600, 0x36, &(0x7f00000000c0)=""/54, 0x0, 0x1, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x6, 0xc97, 0x1}, 0x10}, 0x70) openat$md(0xffffffffffffff9c, &(0x7f0000002400)='/dev/md0\x00', 0x80180, 0x0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000300)=[0x7, 0x4]) 12:05:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000040000003a42fd4bd00bb912efd4070394bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@exit, @alu={0x7, 0x21ac1d18, 0x2, 0x2, 0xf, 0xffffffffffffffe1, 0x14}]}, &(0x7f0000000080)='GPL\x00', 0x401, 0x0, 0x0, 0x41f00, 0x4, [], 0x0, 0x5, r0, 0x8, &(0x7f0000000100)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0xc, 0x5, 0x81}, 0x10}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x200000d1, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000440)='Syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xffffffffffffffca) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x101}, 0x28) 12:05:20 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x20000c, 0x1c, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030800000000006af400fe00000000850000010d000000b7000000000000009500000000000000aba1b997e2f5c6ced012bae4de4de5257c91b4ff6f63df31e787785702e9d38dcb13e9d50709e1758fce74f2b30c73b164aba03f48dd70584dc872c1bfde36e170abd29ae412166db045f2fc09a00769711a2da754d2cbce251dc0cc58f0fed0e941904fc3fe011ab8a18a92b6533e587be2902bcdb297"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xffffffffffffffe6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) inotify_init() 12:05:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) uname(&(0x7f0000000040)=""/101) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000080)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404cc56d7e0fa3a0f5cc5b13a64546ed93b00010000000404000001007d60b7030000000000006a0a00fe00000000850000000d907d00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:20 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) 12:05:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x7fe, 0x140) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000080)={0x6, 0xc, 0x4, 0x0, {}, {0x1, 0x9, 0x0, 0xae9f, 0x1, 0x7, "038caaa3"}, 0x1, 0x3, @userptr=0x6, 0x4}) 12:05:20 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) 12:05:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x32) 12:05:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) 12:05:21 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') 12:05:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:23 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8066df5ffffff79a4f0ff00000000b7060077fa43986d3646fc257a0f164d00ffffff26ed6405000000000065040400010000000404ff000000000000000000000000006a0a00fe00000000850000000d000000b70000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000640)={0x2, 0x1, &(0x7f0000000500)=""/253, &(0x7f00000002c0)=""/109, &(0x7f0000000600)=""/13, 0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) socket$alg(0x26, 0x5, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000680)={0x6, 0x0, 0x900, 0xdb3, 0x0, 0xffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200002}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)={0xfc, r2, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x33}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xad7}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x10001}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x18}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x34}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xbe7}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xba}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x800}, 0x4091) 12:05:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000400fffffeff0000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) sendmmsg$inet6(r1, &(0x7f0000003440)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffffc}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000080)="596ce6540b5e1539c6aff89274d712981d471e6ef97372933617341ff138906964d2adeb35a6a98a55e69761656cc9d84be74325a2194ef7ef8b3ac216", 0x3d}, {&(0x7f00000000c0)="bbbbbdf8b8a807868eea772533d799b043db201aa8b81e0b66ece02cf703f8d5d3bf6ae3160b309c35cda4fa67a510fee668878ee2b61d579c1233c21c5a72cfb042d0d0842bc91c1e4ca04e113a48ff68b3d9fee9abbe666da66e07c254c23de4e5fea21fff19cac711e5a60e674b0caf6ad5b0ab7c3b17d171cd", 0x7b}], 0x2, &(0x7f0000000400)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}, @hopopts_2292={{0xc8, 0x29, 0x36, {0x854b8ea219cb9cea, 0x16, [], [@jumbo={0xc2, 0x4, 0x401}, @generic={0xffff, 0x40, "5b72f319007ad68c3f6c92504b2025ea575c0ad1e2e838908d89bc91ace3fc2541253bd73a93374a5c39525999674af02569ede577616d169dfa48102726a65d"}, @ra={0x5, 0x2, 0xd0}, @calipso={0x7, 0x30, {0xfffffffffffffffc, 0xa, 0xfff, 0x4, [0x3, 0x7fffffff, 0x9, 0x4, 0x7]}}, @calipso={0x7, 0x30, {0x7fff, 0xa, 0x1f, 0x1, [0x7, 0x80000001, 0x7ff, 0xff, 0x0]}}]}}}], 0xe0}}, {{&(0x7f00000002c0)={0xa, 0x4e23, 0x8, @local, 0x3f}, 0x1c, &(0x7f0000001540)=[{&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000300)="f270a54fe143a35374ab632dec5d8fd636903bd27951beda", 0x18}, {&(0x7f0000001500)="ff62dadfcf9c7099f7795710ea28f75ae35c442fecc10a1423174c5fa4b00d6d090caafd9d02accd3b", 0x29}], 0x3}}, {{&(0x7f0000001580)={0xa, 0x4e24, 0x7ff, @local, 0x7}, 0x1c, &(0x7f0000001b00)=[{&(0x7f00000015c0)="8f43ee436fc0e649ceff9514560addac2fedbb6f43", 0x15}, {&(0x7f0000001600)="494718d23ba246d3bd7df18f9555e08b507483edde939c0a5e700c9aae1d1e570c91c861849e0501fbbc451f3442abc63e96ee5f1d8f49e96297dba46004a3a4d80ad3c075d09c51989bfbfa3fb2d11c5d2eea1fc523ffe4a9c1ed6a38e0e95435043d02f493a808b0bcfdfaed9f5393b78b888a23036ec9496a4d38d38fd064cf9361dddeaa8c8b280688b88c9bc59dc89cbef37ad074fcab55267238b0f4d96934216e13a6ec65d8183b19fdca2daeede80a29e8cc9d9c333b72768c8f74efab0ed58f8f63a7da5c04407f153ab5cbd5e8db11dfd6c67caeb6c04d", 0xdc}, {&(0x7f0000001700)="08f8574dfbe7f734029b89c42eefcf2007f33bad08154a3630fbeee30f5f4ee4f8f0168e6e7905b20e1534f8fd732950a0", 0x31}, {&(0x7f0000001740)="889155568b70e1a742b021baf95d292d122a3cb9594ac65ca374adc8601a645670e48101de0dcb37e1276560b09f004bd7f83d26125df997e74f25d50c0fb690eb81459705ac1266ff55762fee3292d50fc342795ed9ebe7f697c3d06e762fcfbf4fc151fdb9b4c7742a9c69f373528ddfe6df46d10b88fa2cfe9a6974ed98487350e4f5431272c2bce496ec3d644c5e9f65d2586086ccc556c2d2", 0x9b}, {&(0x7f0000001800)="79225401aa03dfa064d62e77a511bffd2d4189733f93a4e657b646401e5c121c4f2f01be169e568b3b99939150709ca60fd18b04cbefb8ec5405a19084d1a5b35b85395877ce6b93d65c3d80aeaa7c071d3b10e2f419d3a095e5", 0x5a}, {&(0x7f0000001880)="380df04bf9ebb3a8f173192a580f4ad3cd00ae5e8ca8328ff259373d1c1414a9ef18d7220bf1787816eb2bac49986afb8af907afa4604b81979022fc0ea6a10daf2faf3515a2e1d5ea56001968dbcaf4011e532788cb8ec71954829da2fc5536017f62b57fb3a35f4cd8cee5859513", 0x6f}, {&(0x7f0000001900)="003f90545e55c34cbafed3fcb6d562a88a61b1aa6e30c9a968e72d5a31a13f427fc059be44ed368ede0e6d016fb5b34a6c4f6c24c364b602227336fd37ac274446987b17e7a9b2b49b9e5fc3cdca38c94a85b7658ce109dc0e338f89d510822ba57d2c0dac4ba2c75d14f3262e57ee383865024c5b79c89b0e13c63e52855e3bdad4ca98df45dca783cff05a08ad5c9765124623dc80914c0f120b72ebdb5fe41bc5db884f5a834d7859aa6d4aff9ea3e9896f6c7ef80ca00ff78bfd9345b1e770241ef3e9ad7bb175f0db38688a027e35b5b7b9ab82b1927e050c6ef4", 0xdd}, {&(0x7f0000001a00)="453ea38fa794e4008af817dc051a95f2a1eeaf1a20e55289352adf531d102f5fa990c8a9f05cb9969e2b89f943dc16354257af75d55f34d118f1dffa61178602a8d639aae8954226a200ce7c7f06ae4ef80facda03dbf2e3a0450ec3789ea4e5dc415f2f663cc290ed096acdc0071b9e731558cbd839a76b686212895f37beab1cd8659e44d3b2146408608e243f8570c4eef17df2a18eb4391fd1d7bd1b9452", 0xa0}, {&(0x7f0000001ac0)="681fb4d94e", 0x5}], 0x9, &(0x7f0000001bc0)=[@dstopts_2292={{0x98, 0x29, 0x4, {0x16, 0x10, [], [@ra={0x5, 0x2, 0x80000000}, @calipso={0x7, 0x40, {0x32b, 0xe, 0x6, 0x6, [0x7, 0x3, 0x81, 0x0, 0x100000000, 0x10000, 0xe5]}}, @calipso={0x7, 0x38, {0x0, 0xc, 0x1f, 0x9, [0x0, 0x8001, 0x6, 0xffff, 0x7, 0x4]}}]}}}, @hopopts_2292={{0x40, 0x29, 0x36, {0x21, 0x4, [], [@pad1, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast1}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x29, 0x6, 0x3, 0x80000001, 0x0, [@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local]}}}, @hopopts={{0x20, 0x29, 0x36, {0x3c, 0x0, [], [@pad1, @enc_lim={0x4, 0x1, 0x6}]}}}], 0x140}}, {{&(0x7f0000001d00)={0xa, 0x4e24, 0x5, @empty, 0x7ff}, 0x1c, &(0x7f0000002040)=[{&(0x7f0000001d40)="f9791e079b5cf5028fb3149175739f7d84dbe51bdd046ab6219c8562693b5ec95fc2df480dce83d3ce0d7c1bfc9263912f638204311eac356a28306dc3a721408d706500a2f1bbc8ccd6b6fcc29ed1a13537a60e5130151175f598c01b6b1dca3238e3b7", 0x64}, {&(0x7f0000001dc0)="289b6c4c33ab334e2e5c13", 0xb}, {&(0x7f0000001e00)="615773e541b50e237d381b93acf3d4aab50871ed0009bf0cbb54eba1dfa0c63a0d8e3ebd475f9cde782b360843aa6c1ce294a11a3f10646333d64e4f3e12afbcc7c779b2bbe68058d55153614d7605cdbf9a16dab6b24e82524fd339aef5992ca0a86bee9db9bdd51f202c7df74c0ad39c9f637ea8ff6e5cda958d080fb18c74db4d20b064d3763b58e7e0b30573c6f0259bfb20f4a6659f6096607429d8c8976306e55f484ab2bcff6ce25a9a1127728d7a4015566d9e534935c0e0e6c5881f47786c6910341f1bca0ee297ddb27a14ddf9b0115d0cd1b3d16a99df31564242012022048f66a4062c6c91a850d51924a9fced4a1c6000222d", 0xf9}, {&(0x7f0000001f00)="f0e3", 0x2}, {&(0x7f0000001f40)="1a50fc4e81b03b0bc1736ee2833983ebdf491573f6ef2ef455f53727ff796baf1d2825c74e71937644644d699855c363d8d122e1c46bf6dbdf2b50759d6f13b89cf8113f", 0x44}, {&(0x7f0000001fc0)="bc7f66963db946fa8361676763cb709345110f0efd9228c1e233d1848bb0a6641b6ed0382413388f8a17", 0x2a}, {&(0x7f0000002000)="ac418e037b07", 0x6}], 0x7, &(0x7f00000020c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x9}}], 0x18}}, {{&(0x7f0000002100)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x1}, 0x1c, &(0x7f0000003140)=[{&(0x7f0000002140)="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", 0x1000}], 0x1, &(0x7f0000003180)=[@hopopts={{0x78, 0x29, 0x36, {0x5c, 0xb, [], [@ra={0x5, 0x2, 0x80000000}, @padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x48, {0x4, 0x10, 0x5, 0x8, [0x7c, 0x3, 0x7, 0x1c, 0x100000000, 0x5, 0x7f, 0x8]}}, @pad1, @jumbo={0xc2, 0x4, 0x3}, @ra={0x5, 0x2, 0x7fff}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x7d, 0x0, [], [@pad1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}], 0xb0}}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000003240)="bbfe06b93ae5ca5060f4c0703164177359bad0aea744791a9fbf6088fa5fab5ae2be052332da40eb54c26b4d77fb480b74f7fc2d1c695b68ba0f7f146e7696d8c9e3595063839aaa86b511eb716482dfee402005d03ddee1e306d7408cf0b803589aa4cd288cd3e4716f961b850cbf19824d228692f8018896931c11cf5a2d496cddf57c6ef2390f5722e6b8b2cf3501f4367f38a31b85f5439b1ff2a05aa6a090aa97ef2778da270f12a62511469effd448", 0xb2}, {&(0x7f0000003300)="90ba853ea502115d140fdb1f898a2e98e47a89ccedf5cabf7bb58b047a6b4299340b4351ca6612f31b16f47e29dad156d7ebff18a7c66c5aac1f5ebf9a72c25d2ff5cc19028ea52bb11051bd7b7b656a64dbb42fc5a8275e8d0a781ea7df47b7d3c493d2e9321f989e241b967d68f1763a7f3f93f57852ab3e32a51f7d6de9b3954429f86697f08e98dc143c8a59bd5b17c3db0fb2c157a577fb1e22f2b4c7470684d05ae5ecc2b46d39767401529af3ab15da175bb8c72ca5f761a404a817ab10432b46e51b04447113", 0xca}], 0x2}}], 0x6, 0x40000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:23 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:05:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffdf79a4f0ff00000000b7060000ffffffff2d6405000000f1234b24000065fcffffff2000000000000001007d60b7030000000000006a0a00fe0000000500000009777a49a3458cf2b0fb013a000000b7000000e9185526710000000095000000034e43c263d057d31580ecccc36e708a5d23c5caa5bd8c2f180f7ad4636efff16cda77"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 12:05:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa90000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002150d01653c06670cd88aac0840d6714e7aed687b00b64aa785622af02462e9b2ad3a36b503844fd0192a12b1a74d7b4f018c3ddea0723885a6b373cfd632a63a514"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 12:05:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3d1}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x208000, 0x0) accept$inet(r1, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) select(0x40, &(0x7f0000000040)={0x4d8, 0x3, 0x6, 0x200, 0x6, 0x8, 0x6f9, 0x1}, &(0x7f0000000080)={0x4, 0x9, 0x4, 0x0, 0x37, 0xfffffffffffffffe, 0x7ff, 0x5282}, &(0x7f00000000c0)={0xfffffffffffffc01, 0x6, 0x1b9d, 0x7, 0xff74, 0x0, 0x0, 0x3ff}, &(0x7f0000000100)) 12:05:24 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1], 0x12) 12:05:24 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b7020000000000000703000000feffff7a0af0fff8ffffff79a4f077105dd90f869b0b00ffffffff2d640500000000006500010000000404000001007d60b7030000000000006a0a00dc0a000000850000000d000000b700000000000000950000000000000000007bb6edb3271c5213348684ca"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = fcntl$dupfd(r0, 0x406, r1) sendto$unix(r2, &(0x7f0000000300)="2cd9f3d2b51814963d9717510fe3356568423bf6d5d53b7d9a324f024749c174bfa3cce1da99fb111ad2330bc738942d3aa011a4ba365ea7f7", 0x39, 0x4004840, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e22}, 0x6e) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r2, &(0x7f0000000040)="c4b2726d07a25041faef2a2942fc95de16d41cc9986417415afeeabcc5dc4d2e1052abf05d683ee7aaeb376bc4f23b995912c91e25de02b40f758ba7d9da656c0f46fd03b22cace550a41dde8d889915192aa33d24db41844fc7b931355f93e629b71d29aceeac1257e4c51b551d27cbe1933144b0f9df6cc5b59977e3b227d800d91fa927daf1ecfc98eeb13293008c7c871062c76e41046cb617d48dcbd408dc1505a92079d65b11f6829a9532e88f460227cfdc57eeea468e7f2d633bf2ff32f4c5787194dc0c296e7128bcb12734f1373d3a496fe308ab1fed", &(0x7f0000000280)=""/11}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x42000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30020000000000703000000feffff7a0af0fff8ffffff79a4f0ff00ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d080000b70000000000000095000000009eab7f3ef57310be0000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x200, 0x6, 0x40}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:26 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x400000) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000080)={0x7, 0xcc, 0x479f, 0x7, 0x6, 0x5}) 12:05:26 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) 12:05:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x6, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x204002, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x8041, 0x7) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000440)={{0x0, 0x7}, 0x40}, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000280)={0x8001, {{0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, 0x88) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000040)="26b71192051c48663fc3cd34eab9", 0x0, 0x1}, 0x28) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x14d}}, [0x7, 0x10001, 0x401, 0x100000001, 0x58ba88ef, 0x0, 0x7f, 0x480000, 0x3, 0x800, 0x8, 0x0, 0x7, 0x10001, 0x9]}, &(0x7f0000000580)=0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000600)={r3, @in={{0x2, 0x4e20, @remote}}, [0xa7, 0x0, 0xa64, 0x9, 0x2, 0x0, 0x1, 0x2, 0x3, 0x7, 0x80000001, 0x8000, 0x5, 0x80, 0x5]}, &(0x7f0000000700)=0x100) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000005c0)=@assoc_id=r3, 0x4) 12:05:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703123a5dfe00006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x7fff, 0x80040) getsockname$ax25(r0, &(0x7f0000000380)={{0x3, @netrom}, [@bcast, @remote, @default, @remote, @null, @netrom, @rose, @bcast]}, &(0x7f0000000300)=0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0a0400000000000000f0ff00000000b7060000ffffffff2d640500d04ccf1c1af73072751a9064fd8b0000000065040400010000000404000001007d60b7030000000000006a0a00fe000000f9850000000d000000b70000000000000095000000000000006bb684a185a39294d8927a6aff3e49518ff7d11b3a5631daf5dc44ddc8a498b8eefc98639b69cbda5be4b856debb389b4d8ea9641bac9ad7bb7a5b3f24cf4aa313f144718c0b357457b9fedc37f7b8d068d5ba"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x400000000000000, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) 12:05:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x20, 0x2) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f00000000c0)={0x0, &(0x7f0000000400)=""/4096, &(0x7f0000000080)}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:27 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) 12:05:27 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0186415, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bond_slave_0\x00', 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr=0x9, @in6=@remote, 0x4e22, 0xfffffffffffeffff, 0x4e22, 0x7d, 0xa, 0xa0, 0x20, 0x62, r3, r4}, {0x9, 0x200, 0x8c, 0x24b44000, 0x16c0800000000000, 0x3, 0x4, 0xe5}, {0x6, 0x10000, 0x2, 0xfffffffffffffff8}, 0x798, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@empty, 0x4d6, 0x3c}, 0x2, @in=@rand_addr=0x1000, 0x3506, 0x0, 0x1, 0xfffffffffffffff8, 0x5, 0x100000000, 0x5}}, 0xe8) syz_genetlink_get_family_id$SEG6(0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000380), 0x1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) iopl(0x5d) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000060, 0xe, 0x0, &(0x7f00000000c0)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x13e) socket$inet_tcp(0x2, 0x1, 0x0) 12:05:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 12:05:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:30 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:30 executing program 2: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x15b2, 0x20100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff0000000004000000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:30 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 12:05:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000380)=ANY=[@ANYRESOCT], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000000080)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r3, 0x200, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x48000}, 0x200000c0) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) dup3(r1, r1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x22, 0x77, &(0x7f00000000c0)="ac859bbf133e3e9a3687c43f7608798bebd1b5317a642445cd32ccd761829628e682", &(0x7f0000000280)=""/119, 0x200000000000000}, 0x28) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000001480)=ANY=[@ANYBLOB="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"]) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x10000000c, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x4, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x40, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x100, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000100), 0x4) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) 12:05:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000002c0)=0x4, 0xffffffffffffffcb) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x8, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000300)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0xfffffffffffffe99) 12:05:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() capget(&(0x7f0000000040)={0x20080522, r1}, &(0x7f0000000100)={0x28f, 0x8, 0x9, 0x1, 0x10000, 0x7}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000060, 0x61, 0x2e4, &(0x7f0000000080)="b90703e6680d698cb89e40f02cea", 0x0, 0x8}, 0x1db) 12:05:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x81, 0x0) sendto$rose(r1, &(0x7f0000000080)="30908520db3ecc41ff00d876161d292f20d04a5e4eb2d7c09cf2a4df71b0706e579f05820dd2cdc654ec8fdd108e0a5fb602ae2e2e68d83a482c0af6466606177057446e72371cb79b22eafcb3589dd314cd245607b8e4429d65c4789c4eb0ec7576afb644c6f9968d7236940427f8926cfdb76a3e22f381fbd8900454add66a85a20bad381edb0bb011bf358f895ab677cdc6c4", 0x94, 0x1, &(0x7f0000000280)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) 12:05:30 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) 12:05:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff006405000400000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x80000) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000f000404000001007d60b7060000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:33 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x7, 0x2000) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x7, 0x1, 0x6, 0x1f}, {0x0, 0x0, 0x0, 0x1}, {0x7, 0x6, 0x7cd67ef}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000540)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x9}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 12:05:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='s\x00\x00\x00\x00', 0x0, 0xfffffffffffffe03, 0x0, 0xfffffffffffffffc, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0)={0x3, 0x0, 0x1}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x101, 0x600) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000280)={0x8000, 0x4, 0x401}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)={0x4}) 12:05:33 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:05:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa300000000e057f88c000000feff494d123a46ffce3548925c0a4642b7060000ff00ffff2d6405000000000065040001007d60b70300003ca527df6a0a00fe00000000850000000d000000b7e0ff00000000009500000000000000c69f4da855abdce0fc2ce1b57de812a651a633d2fc58e0a2d61b4dcf2a9a7b79319ca9d0a6093013be79f9c85a3e17f5f18fd2a662ee729905fa88e0afe0f2b10ea38208aa0dc78bf9c3c02f2350000000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000280)={0x6, 0x6, 0x0, 0x28c}, 0x8) 12:05:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r2 = request_key(&(0x7f0000000280)='logon\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='syzkaller\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r2) 12:05:33 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) 12:05:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000040)={0x400, 0x80000000, 0x7f, 0xff}, 0x10) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) r2 = socket$inet(0x2, 0xa, 0x7fffffff) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="ef68fa506676f40fe622c0a00e4dd009fb5bf8065b2d49ce859cf718ef23ea7b1dcb3577e2", 0x25}], 0x1, &(0x7f0000000280)=[@ip_retopts={{0x20, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0x3, [@broadcast, @dev={0xac, 0x14, 0x14, 0x20}, @broadcast]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xc0}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14}}], 0x68}, 0x10) 12:05:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80800, 0x0) accept4$netrom(r0, &(0x7f000000b8c0)={{0x3, @bcast}, [@bcast, @netrom, @netrom, @bcast, @netrom, @netrom, @netrom, @default]}, &(0x7f000000b940)=0x48, 0xa085df03231d98db) sendmmsg$alg(r0, &(0x7f000000b6c0)=[{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="f56ee4d6c6146c92f216f301b1e100444d4a5a5ee1d85ddd226cc99107ae890bd5a528c7c2f81fc554151d911156b6e0003b6c1de2887575ab20ded0340faad70988980a5ca3766afd420afc09c076330771463c388bad9b83d0b2e0202bf6b97b00639c9c4010c9d319310bc159c0baf80b7138d208f9179001a3e2b287d8fcb38e5084fc5fc1f2c3743d802bbf", 0x8e}, {&(0x7f0000000400)="faaacef6bfa4e5b9b6ebb397b3dd699c6de05f6915bb857e59ba680bde97a2e82dd8e78a156bb9cb7c1452286157c3161d908f8b68abe54b0266a1f9c44f486896dafa2dd6b3a243a45e24c45648616f697d8bb8ec54631143df0ec5d817ccada5aa7519c6493b0c01a1a86fe9e9a38d3f5a771b8cec7dfd6768747a7d222c530a530342de2c86c19c306496e27286642888279fe1d935543889f2c1277fd36a235800875febc3a5c5c58eff69f6bc630d0e3ae437740452bbaee930eb12590538f17044a5d0816143a910137918bba17aa963f4d3ae989737284fb335f81b1082b947de39a6d5416f68e1f736d06f713c", 0xf1}, {&(0x7f0000000500)="607b30ac94299b741e849067f1b14405f73751f7172114eab061dac82a1885daa7d1631a493f456a0f80a42da49cc297103b4e1bca06d5ea2ba01b4fe28ad76816ba9ba77bb43706df48b346c3b86dba55449df8a8b61b194864040d04c1caf238de3dbe7d3d6513e1aaf5208ad3dfde44f40b62ab5c90b2d13e6bfe362e8cdcb3f7a204ddf5f100402d1c1600563cd8cdc400b85d0d6162a60ec07793a2880a2266f4667e2595fcf108544aa51e4f8e726b6df9c31caa6d9070408ee15f512e63c5ba500e2346ef7f3e165e77832243ad8259a825360ef4407907c7e90eb784b138c29855455bf114be6506fcd88a3c52b1d00461c830fe3c40cdc038497b40fefefaeb5f007938ae17d0abde5ab4f344d526508b645dab1ff58e18fffc0de77c62359301132bd461e4694c0f67511187425533cc29607060c8fca591403903a8da0e684cd6c72eaae69827c11a5ce0612e4a9c4b5e66bfdedcfc429748b4cd7c4708113529e2dae86355ffb8d2b88a961d98f3a930d519f04b466300ea3df499ca73641c14676e49732799d71eb9a2476dc21e19301d5358034339a790e1a584b30f031efe0725b1ef7757518ed05ebec5a998c5a3eaeb445377bdc730d63be2d57db1d8d1e182845d1de538577917789ed2bcf1b7922fd823cc56b8ee9eae302b7fc01199b18c176dcd121aec5195b137f95fc8badb3d649b228e8e24786c158805098d538a577d10aaf11838d1db2cc2a3c0b1edffe32e6a7bdeba183fec684928e1ff749549bd78fbc60a6f40b3b7fec3783d1127a5ec1d86e3f5725b25bf20da8c5c1cdd95697bd97f5ed91f72a97d1b7ed02ecdfeff1a57d5f92ceabc5b91dadfc5e7d285446e43eef4db4dab04cd3e1f324a14923cc32b80183ead5f5bf938e133ee9be4999578eb00c3814d2fe7e53e6af1fe920f65c20923ae86cf5ce2153ed35136fd9c0c4a07f1154b36ea21abb8b939184f89b5fd7b181c80093cfb8326d62bb6cc9539730291a60e1b2fed37290e6984b2c1f05c5414c5332d0f1aa3b0b1e3b8d25df53accacf5c76c7331e3dcce73fb579ad7e460b5a3f774fca59e78845eb6cd45b8e5c8adddb2ebd78381c92537c01ac8bd9e8c516a6735a0e612b2e3f7dd7f2245c9f261dc5ced6ec1f24d180e69d5c2c540e4d5c1f4f1eb7a9619be98033b63522383bc80afadd68f243b558c1a19d6363b11c8da1a1d71a4687b7f4a667c15cfc53530ae202e9281e166442392f27ad28743ea01c2ca0d39613f335e1e7677a50f3ae7694f35a2b02d050b945ffbad963a0a2c39c629273e5032143220a979a88c8424808ee8fda77f609c391014da984ee24fa6e2c77ef233e1e29b1400b2dfb5b54ed1a71727d4ef2d57ab44a717dc9c74ecce9aa7e5a352533d75d8ce25e88a3372cd687a9ad139bde0cf3610d6a12ee15d8e9a4c1f823401dad698ad47122e36ef8601b639a53e631b6f4afa20bd75adf8841895c054345a9b06ba4477e6a3d7e3cb82dfd472a2036a7627b6a3ef9b82e1ff8b8c18ed8203e7ca9a80428fd75ad12657a529e5d95fd39ad567d685e1b2a735ecc435dc99b18fdfe498298028544a9ab546df156419697e2d94e690ad804e709a8878ba63e0dbd96c506a759891b22ab57ac8d1b29e515a030b94fd8905ad438e0f557d3d8a21e829c877861598e44bab6fa743bc2060e2301fc4d07d85b00e3dea79d88645476fbf55831e8643bd9d51e795bd11662bf72e50c4de60cdf4fb3103105fb6221bf290de3c90c79c376e1cca8fcbe1bc453c08e734e8f2ade2f99cc55daf100c0e16ccd21c21a920f7a8c5856ecb3bed3bf2252262448d4753708f3eb2bdcc158ed23ce03493bf0753079f4883f87d42c320b87b35d33ab79d17f891fa772254e7224884abddbc4877a86cfebefcca5177e321355827f08dfec89a534bc75d5ebd8a671a1fbc4e8e905920c447b7a5bee94ff9ad55c80d79beb1cf552df2c8481146fe50d9af830f5caa5d084a6a087bee44ae2f15ab5a6d52a61ca0f45fea71365496665eb88046865cf0659e79b993173c0200feb398de72fe691d1410bf3b6ac65e46ef8a06ae34d03dcf6b5b3ecb68da6239270a6170457f685f20f6fd45c44a6ea6f6d41947374330d4b43e65c1b67aee3e74779bf3d5fd984409dffdf5ef65e6818fc06d162e70e19a6cdd10ad461e2ba76b6b03f8c6d96f4477a1ad1e894ff3d80217fadc19fa87b612a1ea24c1d37a54bcd008acd5eeaf85ecd54cbbb89ceede64bf07ad8405929363333403231d321f26d9bf19d712f58c81f2fda4270f906947875de013ff7fd4f98a2b79ce078587d795694612a9efe1197c1141c5a3947193f99ff1444191a3c8d0f632be38fca13f7531640ee73776f6cc6eef4689c5f1bfed062b94aa4b4685cdbebe0b0bbc6dec406a287b73212641382b4872fbd42c812607e27828454933792928ba985b45d69d0a551fce59b58ace3c19a4d52accafc09b139bfafa3031d3954e9fc75602a37fd9c78ac5528651f1c886aae04265c589107f3e816d3f87c5005ed71f85aa520d461d256b5b5b72f322581c0573aec5f1aec09618c004018907d816b89fb8b762e5eed74afd9816c9c3061651b1b7e4836d3f1af2b93e51cd9291f7c18322c7566de9a621caef4373404319f0f04f40cffab6c19c976358bde039974d32f3add5cfb050a23d3192c59fba4c0ae7b91b969cbd4eb2f172d997bfd4617d1fca45ceb03d083dd28b1beb24dd5407bda77ffcbea90d7be5f572c01ee5d368be1e18b07a04f42efd970de22c7c487226dc293acefa829c3769dde7f615986ca82af48ea0c693487d733bfbc13a6eb9e935f55aac66ff7dd7a31f924a2b5e53044078092eeebab89aee901b44cba3352eb4ba24c660247b2bf1ff0b85dfc2ace041195d67827ea89f814f47016b243665743459bc7aee623bc6b6b1be8a327f3f9bb82762f340fe77e1fbfececc23845e968cd0aa1c32081eb2d67b8b7a800590252e7f76423cb236c21e4fc281f6dd4213e3346c9b5a88bb37cd5320876244975bba43c8c09031e00e0405db6a888b25340ba7b1e8abd75950d27dea618dc65ea48a234372acfd38dd4725527770505c83894c7b35439ad035be50ee47fb8726e4813f1595bc020767e8706545f563d106a576908e037303f721395cfa83cdfafd719381e1a3717e51e5ee28bbb82dde3c239480e50825ec4643312e7f736b5b29aa27bebb4d37f3ce708e8290b42444c32d7e35c29806fe1fbc4eda50d75fa31af4254d41d345a16d2a2b53f7db97d96168213fdfabc3f1d2fa796fbc03807b3c123eaedb494818c695f2ca62605d4cef5c543bfeed3a2fa8b5904d6d9379860115669734e2858e70a49f01355ac36b55ae3effb5c4aaf2be881fad9aa17c8895212a529207b5e32d2aefab3d8dd6f35d4d68045ed95135e2980cddf1222843dd97f0968833a9706f19968301b23e7d4327f7635d64653c89abd9b74938f47223daf63522560e8a13a9ff940837ebd666b37bf6d73153665f24c8a9fd9227567fdb7427e13041a495bcc1f3a8056b8716940e50cf9395e357e8a4c38939d8f7230ad3d18922dbb00832680f83863113db2568d0cc36332c668e8e7355f873425d73a88229f1969d0c02e8ca22c3fd3bcc54c320cfde0bae7f542040ec6484c1cdf009e8d32729362ccebcb4de76ecb57096bea5ae5820eb3858df1e29b5649dc4f88a42f5b68729bfc4f95cf1a3c22e4126dcc6bbaf0d778e7c297fc4e23b0584b215c17d5d632b42058a8ad2d006f1bceedda541f4437b99dfe97adebccc71ac84af5c455d513231e166d8007580bed0ad410cc890525b46eaa41004064363abc29e399f109a285bd86e5bae277b085658479290ab11455767c986f64ccf4790aa7b3c860812626a64ff323289b85c61278c5dd2b889917712a722806e630f113ad780fccccb732a7d3a1c34d9965c807086081423f2116f5820b00a0aad15941a3afd8dcf3e9a14d6f4d469b9ca7ae8d40436859cf48dbf455fe34ef0befbad5fd6a5c3405c5c946e7cdcf91942c0e46171eef0f8146f7a5efc3c274ad1155f97557af2e54cee5bc6db70d34dfa28cb422e4cdbfbb5a7e60e9e4a345146dc2366741d9901517aa1b9cf205a5bbb9d6ea5f2f56c414f3526bb74478d524b4303fa9cb9ee890c09118ca94bda3c08bbcd00c0ae49808dfae7c12ed46c7afc82d4364576ee4d1fc2ffe6ecda6bc7719812eac154fe490358b07a8608fc2aaf102980abd99a458e3f7046130714cc402c94f9afda16d73ef4fa7642f1545acc96f352bd15907b29f9ab0d96a8d5beeca637089d35e56209551e04348455284cba3677a5a95f22ae06ba6eed29e8f6e113c81010122fe0359ebedd80f266901049555cfbe567c7418a4a803907e8ba77d490bbb0a5395923b44539310616d11066cbb833fa10cba81ca1e26d7fc3585dac3bc86822b12612b27dea3a31694790589c73c4573e7199c2aacfd8c10d318c1331e68643fca5b0d1cfc2fabc85df1d898e778dc61d95777b04e26f53bd7a07bbd9c29f4a120f744562f1abd3013ed9ccb45843b565d1a94dbee11e20772ea83ea8b0fc0025fcc5ad3e2865b1bca6cdf64b28ac3fb26175455e3a0458d9031b6cff0725eccdddc1281e59c1f1c3e03eecb14455f438670a6fd5614f4367d4189c43355e86a6e2d76fe34f1e9aae18229869d6423d46808a642d8d60e2acd031a3127d0936547168056d84f5e375b73d72be444c971a4143a003be10b27b1fed7270e2b9ce9ef158b89df1a3b9764cca880f673cad7105cd4e327f5666e0ac2e90d651c1471d03dc1874c2927889706ef1c775c6f5f1f0c1268972bea3ea33c1782da0aa4af433fe580809b227b1cb2d3a73088c4a835801443f4c9ff3d5c79f01eaff657ebe3105f2da001e979d8f9067532f3d92305efdd00b3d617e21fc67a50fe3a41eb11a79905b5d2b5271be0bcba41cce9602777766660e49c00d78443c9b3d1d188001979b00d28292aa24461f679bc01475dae6d2b5c8a59b2dcc9c0bec72f29f74c661f2310435bbbd6357edd389ab4dd4c5a5d656cf29896220b134822b2a408749d93bdeb3955c0d5be15a24bd56a37be3b1d84c808b09afb6e4d26b6d1f626e59363e1746b0650c47b5e1c42df74a4ac7ea03c53399787862f30190ac9d220f7a5aec536704ab8f2d6664077cfb206acc09968661eb7a6e6a843601d788f5d6278e800409642534fa7c16d52985121136be48d941109be129a0bdf523adc5a4a70d477e7152b5c5e52e6aba1df97649674da7d5487fe1f0fa3bcb2fbb51eeb942107bba456ecbc5b1550318d33be38f4bdd235f341f3884fdd13db22b60ca3bb248462861cacf9f2a01d2b329033baef87c9b7e70263f0cb2e01fe206e6d223ea1f48c3609ca7da079951642f2758711e1320d35024acea66a1009dcf8ad1499972e4ffbc81e6302f16fc5c2e6adca2fc8e3775e20c6e5f29c7e0614aa924803c0bcf320d724feaeda29617c16258ca78c80b9f6689173a25e4f91623b39d2c2137ce53e3ce47919bfa5cd8d3eae3a29adf8879b44ab07bc0d079e211b24f91d3d1771a7c456132abdc427b4e6ea23719c8923e14bcdf44216cedf98ef7240369ee5b397cfb87e7acb1af2532d11fca71f63fc6d4d73362f37604bc7b65177a257fc26967c009525eec0241f5b043de7b699aed78e959ff872982a4c31d30168da4e52c125bd104b13845453e76e4233df68892", 0x1000}], 0x3, &(0x7f0000001500)=[@iv={0x1018, 0x117, 0x2, 0x1000, "ecd119a8c26db4ea579b9c07c3ce9d19334e1f99163121bb2b8625debda441aca835094dd972eaaf6e7effa2956bf531461d6c658c48c0ffd9f3497c8e5f746bb2397a47ebdd39988f0af875b693a5482e7c225e1fff670fc098d8a8a01b87f98e080a61d71e2b6bfa10d422477b9113b882c2708862d2f88d9e7d6d306842cf7d880213712d7bd5bd3c0f10570b5c1af53738b42d3242ac1ef8a686f417177e48b09bb1ddfb6d58dfd9ef79c927fa03311bf0d841ebee6db48fd3f574e9daae425cc254e19a245e4aa6ca7f6660c9587e80b79bd0e384bc062455e22f74d695eddac9eb866b6dfb6da3529e1d547c9effac29d52e66d4d67d273dad3dfaa46f2e68f2041b8c308475f9e47d1986c5aae609ca90f129bb5bbf9f1b7ef7be0a6948efa00d5359429d7571f5f0a46ef945c57b70ecdd24500d0ea39d3827933d33e4727d36a03e9107283abe181cb860461fdc3cb6f6e35ad516ff3037826974c52a3563f5810a1fb0d220348083a8b5d95ebe3062d2f6324c3f4a35810cad1d91b0870c93ba21d5b6f7491f639d607e3e2cacf3deb56ebcb24ba0487d7080d33d7c3fe15d356a3e12de2c6af571e2baad950a13f37b56c479f7466306b4ee0cf41a54cf8d056322bcc0985d1b860fe437861546a6f67b79add7fef07afb2631423a9032072da3b5fbd78369b715db5119103c486c22a033003a826031e33fc169978da34dd998543010fa22c495e9ac5394603912ce8d82704b49d118df0dfdc967626fe20a17a97dc5276024d056aa0cab3ea0e3eccec2dc8aee5a4fef2b987ce98999a0026ac9353a20fe6e3cd8cb827823e8615ade351a99f08f5eaf5be54c173984fe23aaceb271b307f4061f82a7144acf7a26a3c54a37f7fff224c4545d0e670c09d5bca5a1ca3eedcaed02df63ae1ded98dc7b21afa941c6adc312cc3077a7f4debcef064bbc4315ff1116c902b99e9d015d9d79feabb7d50a11f8dc49b69f6bea12a7c1be89cc68aa814502c477dcc457f0d75bb05a3e058d83c9df61c08829b8d4725036e9e60f48865741267a7345603a704fd4f37d095ecf2c5999c9abed26678ff913d929fc2959dd42f2848766e539c70509bfe3f096ae7097eeb057b51aacf3ebcd1715c83778a9667c491efe3fc58ed4b0a21b0a8f98a6eb98e77429264e5aca2f80dd8d78a36bc99728135ec806d741475c78ce3c68e148faeb6b2703ed8a62aa137e6ea9e57406cb56e2c97528de068e518c32ffb21088cb97b45823d368403bbc2ce8a4611e0a1ad97e53e92e25cab3446877145e2a35c3d62b538ed76e8249ea6859e2662358eb0cb45deac216c51d4bec7b976885dbf4371c931f0b7c4d4c1fe03758b2c6d13a07e6013ee044f30009be4e75589ed6b34c836f7f78c68e53fa79a2a3ed01070c0eb367de2690249cd731647fc85a95bd655bd17acb78832e005e727a4189daeea4dd9f687c2c08f1593c2fb01865d25c4653156c485c84c6a11cff77a693a71e04f6feac9625a0c2cc0790c35ea9eba00c7c262be27b89ab330bd2206ae9bffcd430e14bc7825a04b2e00f70b764d46125cc6038605b0751417f3d63261534dc5a247ef69170fbadf3e4964eb6e23e6d2ec5c4d38dd25ccbb5b2b102555c1d330a379844f19544cb2a177bd7cff99af3a3721e5654f85b05d443d6b4ed2aacaee7bf8dae6c0c881b3a79c6093e4b70702490b3819590c836d053e081b7ea2df03e0796bac3d0c785431ed25b1d0723e0a213f0d6fb86e5be3ff7893c77370284d0391c4cfa99763894c02765b5b9327fb3029223ce2ddce1e0ec307596915c4e5c035c2e1844762ee5d56883731ed2908e10c7b10f3deb92bdc2e7b1f51a2a49390baa0544a40cde04a7aa824085f567a72dafd21ee75c89a9db4f171ba0d0661451dd609c324f7d283d6aa14cc48389a7c15648dbc095342eae09684dfa5659e88cb29aff6665c7353216ecd4bd04e534103f2ae97c3e12c3bc1c0ef71c5e888c2c0589616183fee6c0424aa941f404a8335ee79ebcc4c5a8b78f1e439991c306023a252d953fb87da37f3f953524981a0ec37b39cfb69b99a823ab7e4417c752ed06dc609b1e1ac30253939140b6c4a5962a6922030c83b12bc233792722fd5ef5fc1ffbc53a2926b60ce766adfbd8b024c7f3ba7ce360a0eea38d890ea53f3411ec543a934a28ce5b8499fb7286936bf02367aa6690950f1d2d1b4a4559d9778f4ea8f6033ef5510c373f50cccd76cda98a23cbd2f70758a64b98844891031b0e0cd663438333bb0e5b1871b05e36c1e5cca8d91f604fdb9bb8ac2b27b22867472ad275e3b1ee705e5f22ce20579dacfdf9faf6842d06e435aabc7f7bdc08dc32bcd64f893f0a1a547f7bb8e3bd6b05b258e804ea0cb60ab9e0ad34693dc834897f2669f9c077a5b727478318fab790673b9b8135e78137ba07a554ca127fbc980454eb347ca9802ff6da8ebcb1458d16c094aebc67d4cd7505a9efaf74c0fc3ddb1cff67ce369b2d03922d141bc66f7d4c501757cb0e6dfd6afa11135ce2973dd2340042981eda66f8e1d8f97ecad0e79382e503ca1b7bafdc3b842862c49b02aae63872ebd4b4e1784b236d25fbed6866492fdbc17decda48af7652509dafe9f585bd420a8cc77f0c0052b7c84505ad32da033f246320eb84f1aacdffba3a1e13e4ed4f4e4624441f2ccafdb840382ef93a1060756fb0580f543cf86990a957033d9f036232ae8eb8eb4275e383368b05dbbdac13e8e56a6b9b1c8949d1bce213f41a546835f4755b2d71b7f3e58a8bd25ae6ff2def25af207541da71e34442013b01e6fc1db34da6db6358af468ffcc2eed0294640659d3eeef7ec453d7192a021f531bb4d940fbfafeae4b31cf45a2579d8c32c77ee2a4c462cbfd821c9aaa37ae5560f48b1ec3cff3036ab76f05ab80b03b6de31c7fd127625efc1d1b7d6c3f31d041e8d1ecf426e7b3aed085bc56ccde944f69c007715f272456b84f1e987620f6905e733f9c2af5c712b01c177ddb002a1a2aa7b6a0c950ff7f6fc57f2026d6e4e68f2bfa4847f6330616bab5d85be4a7ee55d635260697123d730d086d7ef3d4e55c67ce8975f200a6f3639337bcf0f970abbd9f9273c33d378ff914361681e41dfcef64182dd4c7abf0ab7898aec137aa343d1ad21865424e05a2cb45d483e98ed9e4d84d1ee9599771ee03d3df8bf2fede0525d0a26573f618b784cd212780f336094e519f6d1b4574aefc97aa50c02e8c50774bdf31827ade8a673808f73993bd22f1572cf5e27766889044524afcdd74603b99291c942b5680ff5aea43f7f605f61bed7a033d7344ee8786a72b084d9eb022478321deffbe94536e26b34b87b91ca030943078d0cda013d3a9fb9da7772e49ef3d4c2b853c33e94abddf29abf7d11734ce58f8dc1c6e4ea74e870386ae4a29bdf08a8c6f5fc6d5544be3035539a3fdc9d83d7971fc59836cf06cafecc42a1c4970db271a71e202fb938111a23d13ae5fa79f4fb197eadc41d65a843a5ffba7b322daa4c34f929ca6d783b61c1c887f0d9eb840d65188925ef6ea8b4089ef65cd90ee7fe292076e47adcfb21619b6f0a484c9b3bc397167e2790be8bf819ca0081357f1a86142c02bd94f97437dd3a62a22fab0b0d377379cd678ea08860824f8ab3a9d00abbaa8a3f470aacea8b94aa94f5ea79894565d2e37fce86c0c6fd9facce8d7814a5e0889a60a46bd26dfbc2d36216d10bef436bb0ba2f612f69bb164a3502dfafd585a5b720f5c822295f219e230a6e2f441ef79fae94d1cc867a24ea72d4505f799da8de92ed8fc689b3e40a5a4395ce50c2da232e0326d2531154cf10c9421b10ae1f98df6fd0e6ff3b6373f37fde726995fedfbbd9b3c59f3c477a0971ebf87070af318cb4103564a43ffa965d0cb7df57af89b8f621bf241ae85a4b0f5c3d369f61142cbcfe7b84878dbcf91856356354f1b38a7305dc3a9496477c1f143a55db78e645d19e5aef5a4dddcdaf3f253d9db7efd10f9db8098a5be9f6538b6639ecd1c10cff7c3fd6e5533e204d21eeebf8e783fe76f78d3de99ed0eb354b04019138e55b8f01e654ab16967d83e5c2046f5b2ea6628d30d9e2b9b5ec8ac4b9b262c4fa23546a345e7e2de6a95c794838dacbc967edcd0f26e2f1b26865bfd73e39cd9bde2ef4302d4552c41d49099e47f2081a8e17c67ac8ad2b1627493e7e1486a44557e77eb79d571b98d69ed51d1d4de9be52b9e742cb9e2e3736acd3a1b1fd41dcd2559930d612882d0a9733b2dc5be598a2c41ef4d8008348a25d530825359c6db9ee49bcfe01b86b32e22e21d56c6f68df2b88401c481e9b6f6bc07555920d29c4a497d717208f103b783992e719f9dd8e88769e146a8d7b881ae4394e080b2f2a33d06540f964476d03b9a4ef5fdb3f6ac0081b3532be61261e764265cf73c37f20d893fd4731ea6c26f8e31a80b8c8a4e7871bb1552d4c15980afaee072df0281b9a6b6b3c84e861f897fb2d2c302b89c4dccbb6ae09e190796734f2c31912d414d858a3d077e69de1ee043c111d4c6964eeba2ecdf12152965daf7fd08c69bff9ea34768b818e2df8552dc280375f74b916e773b4a1509ab64daba2c20409b41adc11a2ec3c5241a5db17bfa89cef70a32220abfafcfa015af6ac4f84397885318aa7a7bc0ade8b382ba3cbff58cb70dfc19dcd53d0c83475fd3ed0f4054ed8b012887c7fbc121a4ddd290b5372c903786a36145f9a99812770aa03974b85919fbedb42536424d994d1c490fd92c4264cf2f57f2854af56ca41ef43507408fc683b8ca2c3efb8797c54da965682fd3784fd1227948fae0a81614dbe9266fe9942417676ff33fbfc55bd4798a6f6feffc5d4a3f5c7257b3bed5ed1e8ffed3c2b0503b2b00aec292eb268522dda461889cca1154142a1631ce8e5f09674f678db6b4b436644636ea43758621edafe33cb4c2ac3172f416d19f1b20890877a5bb3dfed7566a19b4bad14ff86856d8c6cf6812902f4939fa4b7017c1a518c447b1d64d44f65febf1a440af93e9e589fc88f4cac5355d3d33127cab7402a6f45b0b2ef975ef4e8eba7660a921b8bb9b35707bff3dd27abb7f3bfedee8e274c30441f9ca940489d8ca530b4d94d05e930ed49b09396dbc59b07812c9df7fa2d6b4bb37008f1f63893879285eb165cb2b8543485a957d5c15e5e233af1a96da48047a2ce5c1532b7a4cb2643134866b770f58710e155e1037abb15e08e0c50a4d62132d02a149d5a0e937ff5914e31c33f57fd332039e56f6b1248a5f4cd22a09ec538615f9e5d732c0e8a14cc00704e3c9a5f6387fd9893917906af3247694cca274f66b796009b17a265b0ede034c1b3041f90aaa32370822bc41549f2499f806080cfdacdd36c7a3c86a606b82b6ed9aee00c1e021d561f11b0a2ba780e2bc15ec2798023ded661012a7df779c062ceba6ac9d60a139639865eb4b535dd90c26772e3d195ca63fdf9989a05ae37c43ba0e841bc543b45988eff276128d13f61b51fd4573b53e5a4273fadcf69f653f8db2b740dd644c600c8fc90c3bc0b61009004460e26d792d379ab0163fdfddf6d83bf0c047174cd5026f297ee17e0b23c029546eb23a846275350e7a51f0ae268fc6e25c6aa3cf20a655dc0e4d49ea5cc3bc038c0c3fcd527e58f9c7f8a23a49ed54a36748733ec22368feb618a92d74dd6dda0d9fdfdcb8e8dcec4f7caee604bcaed2309ad5d2517538fc482d5e021fede0923435bae109ab1de2d6777cc"}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}], 0x1048, 0x90}, {0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000002580)="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", 0x1000}, {&(0x7f00000002c0)="81e3afd9303c27abb114658ae01f1a4ab82bc087eb95e87b95ea347948abc9e02fa855cbd8727dfb32c5821979b0852adb", 0x31}, {&(0x7f0000003580)="2bfd43df987fd0da139d360c1472f5e1362b2621d5738395f7d1728ea02a5aa9a12b09a727889cb5900820dd621f0ec444717ada28e802037ddb1640cc6675ecad497d91238bbc2ca9e74a98f2ee05ec3331e445b6295c534e813694a4f9efdb6a53efcf6947bf43c1027b2b94087e6bcc9004e31158ef8defa655f69e3c4b9fdc3abd7d1df6c580338fbb38e210150a926d9764fbd03e0c53da1dc23ccc61d5ed5fef8f313a7cc094f9346ee9f484ff1567cc96e3ead7288bf8293cabde44d91ac4a803a63ba354305550ff71576d7a496aadfe443ec36b4b8ecde977942240172cb326561cef146f4d2f38aa9d623005649c30", 0xf4}, {&(0x7f0000003680)="6ade87de22bdf3708a72cf969b9e324650e3bcf5fbc8ebd35838091d4762e657a77fd2b9dfd242a17bc14eb698edee00a0d00435ce41c4dd0dcb1fd8afd6d654a44d4094e882d03307053c609f30933def446576103b2d1b5fadec598fdc127b52fab6748baad620637f4435d77269cebdca3760bf9ada32bd714515", 0x7c}, {&(0x7f0000000300)="9c24d2e78dc7d3cce14f3ab3569e2571dcb48f47e964cc924d7c2ebf23eca8f26211f4f024ca47dc4971c8", 0x2b}, {&(0x7f0000003700)="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", 0x1000}], 0x6, &(0x7f0000004780)=[@assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x50, 0x117, 0x2, 0x35, "049a0be8b44fa142ec5a6c276e5fa802f0bd9d830918cbc8848e44fbc3a873d928d6f04a90bc0a8dd0691840bdd259cd42300010a9"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x90, 0x117, 0x2, 0x79, "3ab8ee4bf3d87ea0644fd69e3a8a67f11f51f5acd47ab187fb2bae6df762781239c85883ed924e1381b15e12098e4c0c1e81fee72c07897907c2fe5350dd125991813a4a5bc21f7b01b668444ef7189521108df4cae473fbe421cc4d7024e4ab8b34ab392f9190a41b84a197551a0c49c006580cbdd9a59f16"}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x140}, {0x0, 0x0, &(0x7f0000004b80)=[{&(0x7f00000048c0)="d32d5064d8ce1757a3ccf9d8c84ba8b7c0b09c96c7a7b1db1d47a1305b36d7d2e2fd1adde9df84f6f01e2d7f57625bc2df18bc2d1b19f079b8323ffed4ef027786911258567d3d1e80ea0b3d5d8d06207153cde9e55037c9915eeeecbf3b3162d2f1acd9568eca9726ccc5e944eee6ae87fddbfcdef9a72cc8e0ebb21a1392a0a299620f8f8d40723c4371d1286dd74f19b27526faaab4da9585ccfa1b775212146ef37f93ddf8b8b93537c215749694473f528ea6c85af9d487be442020a01dc4a5413ebcc368cd894de95a2b6ca0edbef064e7690d280ea1ee689a7ecf9cd4f6204a42e9d8f76e5341", 0xea}, {&(0x7f00000049c0)="d898d1361b6167a09ce9f47401acef458a8c3388367d2ad6880b9fca078ece049ada35966abdea96c759346144ee358ceefe09ee6e550f72aa42643d0442049c33269312fdfc7f5fdee14ad7e78be14804ce0508afd61ca7099901b95983", 0x5e}, {&(0x7f0000004a40)="1731da6e77afeeec6f14bf855d99afedf73049d07bdfbb8ba36dc1f512a5a8c27b2eb54b8b66172e9bc10741de80a40eb92bd1a6e7eb7843a76b7c74e85093476f28964911079298fa50a740dd7cb9dcbd7891050de14e68095cdd8642697d258f1dda99fc377a56856b91e20b270ca530a12117a86acf649ab4c716b7bf54ca24df0d1d7c", 0x85}, {&(0x7f0000004b00)="1dc646c406d7a51e441f8d233f3b86a4978f00c1405e47524a4e5bf24cf9afe13b70818d09b05c4b6ae6e5b8cdbf79aa2b35019283abd7729115ac8ff97b7e27651ef85c89c818605dfab19820252ee5bf72c983557c2956d37105d28f225de3ce270fc838ee3dcbc5b6372d819e16b4f9", 0x71}], 0x4, &(0x7f0000004bc0)=[@iv={0x108, 0x117, 0x2, 0xed, "06dd74a51e232c7a50341d99dbfe5af8e86fea5f2ad24f7e064313e1b95e26e558a5b8e0e66642866c67c0b562256edb80945e2ccf2975469b248be034c135e300d198438dd3020469bd609ebc73bd3f95bef6b9a9a16884d0b67b3ab37d3a0ac0fc2fcc5feff33285329bbacb7202a5ae87610f867253c645eeab3857cc4f16f353b79efd14876476916294b3c8d2d2e76ac7796f2c0c579fe35909b8952e447c6e5dd203493ae53a7e2d15ccbb5bd599655fbc4f71dfd6a899f5a5b8501f24f2e0b12537467387d4a3ffbdbfd6a3cb778f56baeecdb53fe6f4ef6be1b6b434b94e1cea16808a3356f3606132"}, @assoc={0x18, 0x117, 0x4, 0x6}, @iv={0x68, 0x117, 0x2, 0x4f, "1479fb5451226867a196c6d59cfbd29995213bffa96def4087336e793965aa2249fab585f0fe2427a903f4d21e06551d156817d83ba558cfeeea14e461932636f5d9edc9d0a4c4f767c2a10113a75b"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xd8, 0x117, 0x2, 0xbe, "2d1237873dcea60a389c66ef72b22f9ca82391852d532d2b50fceb0fdae6375371db9786839703dbdaaeaab605fdb63194129332e57e0155fec86f2b17c0e72a0c287d02f4302ac18e6ea08ecefa5d30c78007718a78b53ab513257974f84218f7230ff3ae36fe3fc254cbcf61cf871d01c5782fcf297c6974982fccd7fcbeda44ff416e459033b2f2c58929593924d0be578c5b6eb77980473f5aaec7abe0c8de33acda70b0abaeb66821524f5f9f90a5d3a8acd416589fba88e0b8de97"}, @assoc={0x18}, @op={0x18, 0x117, 0x3, 0x509257a23392b4de}, @iv={0x70, 0x117, 0x2, 0x5b, "5c32cd3bcb8b622e064b219d82a8a9ab6c927bdde4b30865956b9cd233b39730c4157179f6709ba3b317be9ed7fe62d5de308a659c33c4eb89747ff1fb11b12e55ddae43540f2eb60b5e3f78d66748b6074c12d72533bbf3421d7e"}, @assoc={0x18, 0x117, 0x4, 0x100000001}], 0x1348, 0x800}, {0x0, 0x0, &(0x7f0000006280)=[{&(0x7f0000005f40)="5a65c3614006556601318d271b3ff3fdba4ebadd502a19ba7b708abc1b888ab0efb3a18e4c964e219ca8ab4b8f8004", 0x2f}, {&(0x7f0000005f80)="5c780fb075eafc3f44e948f2c192f0c539", 0x11}, {&(0x7f0000005fc0)="192b5daadfb1fac7e0ad18557b10a0700c334cd3b32471f960054a26a8cbc88b4bacb6722a50944b8f99964bf2f517334acf35f235aac587d987644d16cfbadf2d58ad644695a71a90dc835f66021d5dd76190af39118f00d46dcdf314e0fa6690beb8f3a75b4413117013aeb7ac09e3478eb203e6c99b51f3c0bd086d6fb194ab8900df3eef292d4472c58eb9c4be8598ace3346f5a5a3f1b921e4ab069b986e612071061674e2b9fb142a4b36f368522ce67800f44fabf5f1a221881d769760705144928a56c548a74f9139498d5a45f14d505b311eb095ad13d0590", 0xdd}, {&(0x7f00000060c0)="e847cdb3f7c78ac292c24d56a214417b33f6452d2ed99fbcab556d5820375f4703e6c593c6c8804cce9b419a7b3ed3620fad3df0dcc42ffb1cdf76878093d0889b195ccad5a7559cbbef74ebb476c525bb122cbde3b4c8498644adbbc467ed594c42f345e6e3e1c4c79bdc301c789f41fc2e1e259416be24840574b22b3dffdb371b60d21d7fa2c3b3c632571d6e1a1e374f15454f1612be9459af6e5d7e57e9ab26c2", 0xa3}, {&(0x7f0000006180)="794700a929df5bbcce5024515ca88b130582cdfffba547985bb0fc396b6215041b6ab5d63467b936c515b9b34ed29bc4955476c14ec54d5c1ba3179eab4b3318a98f2bfbec55cc18072d8b797e0ab9c4481f6c4813d1", 0x56}, {&(0x7f0000006200)="b4d4e979713878fd747edac2391741eb5980968b21c2257d9621d13b23bdebcb48c745ce6a61eacde1da2aa47fa41451e5b7114e7727452da57b280005fcbc4529c911deca17f70423f8d62e3164d1bdea421689e686f130df4daaa21679000d144758bbd8087335cdbaf35609", 0x6d}], 0x6, &(0x7f0000006300)=[@op={0x18}], 0x18, 0xc0}, {0x0, 0x0, &(0x7f00000086c0)=[{&(0x7f0000006340)="c855b86c59d8", 0x6}, {&(0x7f0000006380)="dd9fd29c5af0c2cbae0b0f84ef13f68f7902c9feeddb23e5fa65cbedc14095e362a2582aa4a16375b2a2b9e119f70aa3de52cf65f640af169bfba9d2b5a33d332e965e515e61a864f533118de9a574a505efd882ca4948b39c56d372a7f62ee0d8a6c58970057156406331caa19214cf699c4fe90459c57dacb3b68b58bdf9e3f28d9231d7cd95cf7c0661b71ee9", 0x8e}, {&(0x7f0000006440)="19079c2472a3d0c8d16c88a6ec8910511d476476ef93f470ee172fc5deae5caa2cfbfd4325570d8a58eacb5b771c9399b719743b959dd260a43d9e1692dc03005ff436dcbeee6874a63210c981ae11b3c3a29a01452bba7b400b8d86e9b1a72fe023284c7641931b1b4909db48ffae7ba43e9851dc55d92b6565aa4ab4c2068afa7e4823db83935449246b4fc4bb4b2b34f23de9a152e90ab578f7aaa4f45e2de8e605e6690851cefee4ac26ffdbeb67a5eeab9513b84e", 0xb7}, {&(0x7f0000006500)="c7f849b9fc58b29bd3038a9fa7402d4f725f06251668b8b60bdae7b862d2d4a5e9b7f60c419f6c0074f7", 0x2a}, {&(0x7f0000006540)="3feb89f32a7fe98e166a4579c9601693ced1041333e4d1ff65c08c8ed71e65f1807940cd1a34ede7fe6def3c04dea869e58184ba5b42b11e65c7de9629c34caf97888cc37af9f658ebd527e8530f3e5e3a15d269d5153c64b306002d464c8c0b87348eb6104f0ada777f39b66ff300dac1f53dbd328ca72ca8d495ddbebf30f6034385daf7e8d37e890a0bc7a7f08b9379d22d9780038d2d54f7cc3f9e4e999a03f476447462abc62a82d0ac7a88ac417d975fae51d6b6eb2b79df945462a25ffd520e33d0b317292b", 0xc9}, {&(0x7f0000006640)="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", 0x1000}, {&(0x7f0000007640)="8ef24a060a6582555fe9f31ce37fc0b7c26197c6b580f6dc2b8e99a2be1767164089a54c65c95655e96fb01b4347beec992023c4ff8b5425d5824e786370e7213bb6dd0d87e14a3033b9898f28e2c03939a29e54adf33071c25fd57b072a68535bf70803ab3d12f923a6abfb505092c2ce83db294430", 0x76}, {&(0x7f00000076c0)="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", 0x1000}], 0x8, &(0x7f0000008740)=[@iv={0xc0, 0x117, 0x2, 0xab, "3a8a3ef955b96d9fce08f9855fecf2f7ccf51d8c9ef941af9e953cbaa5cfa9ace92cea57b4659791865d4c6d5300b6f043dd0b3b4c42c7cb1b3a2cb733cb2b659a895e4a7c939707266380ff05e8a27ece243b19c41abf4ab1c702e28c6bd2ce3debaf614467dc0d99baccb8208e67c0b63a1077481c497f6bc74201ae01a26969eef66a9e75dd16d7533e132fead0bf89de0fc2336a691b8ccdc1040161f2405ccc102252ee6c5822f9a7"}, @assoc={0x18, 0x117, 0x4, 0x4}], 0xd8, 0x4}, {0x0, 0x0, &(0x7f0000008a80)=[{&(0x7f0000008840)="e2a1e2bce92b4c3ff0b70863c8e202a8b597b9e63eeb9b9dc0be9792fed79e250a99ee2e54083d49fb21351b245434a7a58c6cd2c9c7190647343dae0731b97b648125e6de50ae98e6eccbb54f7945db364983ecf200ebe2bf2d9c3ecf4c19658cf28005333b500b082499b4cce732e34cf9f93a24b7e083b5b7554b7849db88b84f84a0b883d12749e9ed69b45e82dcd6b2d0cd4e119056081dfbbae77c7171f32159a3935685c7841c4adf7fd06a7d3221a5ec4683329868", 0xb9}, {&(0x7f0000008900)="87a5b5991a9e9e73e984c70d250bb036681101a915d2fe92bbcf1ca61770a98fd6ea03339b6112b6198cbc000ed1b3f15b74aa6844835abea4b1455555fbb7a5d3718ba8c3f0b1210efe02f592107e70630b7780edbc9ce3d9537fafaecc", 0x5e}, {&(0x7f0000008980)="e81ec30829b437a145dd3bb5b9e0211ae27fc97a5eba3d92ea433b8e581bac48704325d017f178663842f1e51edd772b91bcc7fc616a7d4d2a67d97e974b96b7fb34", 0x42}, {&(0x7f0000008a00)="f688f2a1c4cd89dee23c0778475d218f7fd16378d962ac81ae165004708236089fc54e58aa4e94894e4d19934d565703606184a8f292394251b5f5ece1d8dc7c5de1c88cbdcbe047175173551b3f79eca7b98f854d52bca1a9e9d9c17f08126edc4abcef2f1bc553bb03c31e363bf7670cf2739f74", 0x75}], 0x4, &(0x7f0000008ac0)=[@iv={0x90, 0x117, 0x2, 0x79, "30dc1ce34289325ee634b72f75bb26226ef129961b61189ebb0b8a244aeb780c1abf5b2f4766e72a767f8241045dfc0daf7f24628fa9d2af76beb82fa288c68cad8ae3482fbd4be47bbce89ea537113a1ffef617473ce32271056719c57b138b83fe0c973c62bc9e852aa0089f7a6e9bb5c8661e7717768b0c"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @iv={0xf0, 0x117, 0x2, 0xd9, "4117a79d3e2075941c06ce6f3e950e67e04b11a6bc193ea217c9314db27d753bf4f58f1ad71216e1286d54da52ba1e0f5bd9cf99a547ccf4954d55c7d690050000f62b51aba1fad827fc7ce43b8e7a8bfc55ea64facf8220edba7d0ced8c56884bbb403be052ee7ad14d8ab7169193839e3251e6445a382406c4dfb3f8586a7a2b252bece8006998c1b22925716dd9cd00ed436703acc695bd5ba9cb35bb8ae0244203682dde5b8dd5bb377a3aeef88bffc772c0851b95c97cb5a3f5cd62c787a9383a332a375a5a9d31388e2bf2d31b4b97f3ecc6b1c8d42f"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xc0, 0x117, 0x2, 0xac, "cc7e56a0f7676ec513d4c372fbfbe303955bd5667756894a26715f0729fe35a00879a8a30ccc50dce42d4f21fe47865863cd3c25eca5d7c38762ff05f20624aa4a5fe52c5995b85b2de80509d1e4cf7a9617fed9bc471a35f2f42265b2ed79e1ae61d2bad2df9ede46efc4c52a3740ddb777c91cf3e28d3ce0c98cd68f74adfc58f1d63d5996f0dfb1e3e6e6aebef597d6a23c52fa839dfddb27e8a6d3c5e2360f9563fd13d99ad23070b5d3"}, @assoc={0x18, 0x117, 0x4, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7}, @iv={0xa8, 0x117, 0x2, 0x92, "f0c5e3a76d75777330298f4f8656fd67e35a5e6adb5fe67790017da2649464f80bd052c0216f22c2e1f7dd7a68bc8296bd8649c082cc5279a509d4317ec2383c577855dce178432ebc1100393f1c4007e33828f27b2fe8ab195387674e45d3ee796228bb8033ea438d3c437add5f0c7e24c0c3b29e7dc85b3bf1568b7ac33858be8a1283e2daf0ab91ae3b61755d1e86951c"}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x1360, 0x40}, {0x0, 0x0, &(0x7f0000009f80)=[{&(0x7f0000009e40)="5558830b51bc9897f6f32ec0f64dec1ae6fca01943b6940a4bde647d357c744fb887076b636958b672d47d978b31789ba3c0159e7c4b8eec9e6fbb078b0b1365", 0x40}, {&(0x7f0000009e80)="750186d00b79fe0f912c4d3dbb0d3600b73f780caf2aa5e3b9c5e96a9fd23167e124d3128a9c3d150be550a59c758f46b048a23df79860eaa69c3d12ac86b39f9a9a4a2e4d6148dd8b35b8f527e7963d2138057ba847c9a6d69073c127fcc2e3b136a98336eb3a5733faa2eb9c063d44bbbce08d3fd9ec18bacb6ffba6212b253c901f598b7680d58b02a13d3e5eee41d4e9409cc8b4bf43df38473f2693285cfaf6ddd6d823f96d29e5b76c9653a3567efe4993a2c5dad39e25e3520d15870a93e85808b1dc33a1f7b1661ddb1518ca7f0734c02ef2cc59", 0xd8}], 0x2, &(0x7f0000009fc0)=[@iv={0xa0, 0x117, 0x2, 0x8b, "4503c91778579c84f48271498658597d07a805b3e9c1bc83aff96a3d62f5fffea3c608a4a1f5d84b839c149c4466414d20b0aa5ad000672377d8ccd9478230b02f9cb3a5b959ba11fc60b59863c8b08f97f7921865b1ca01655909ee728c86660266d524f69e96e96e9e433d8c1dc4906c994e598fe104f09d9ad80fd2b6d14ed03c10e71b3b8b3dabc7ba"}, @iv={0x60, 0x117, 0x2, 0x45, "f298b1950b22c66d99507a3c6b4a1d8d7e8ccc21ec293257016f027b6741216d628a7b8a9017f006d01b77fe77ef970536492e4002f559635fa9ac9dbe48f5c9d6e41a711d"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x61}, @assoc={0x18, 0x117, 0x4, 0xffffffffffffffff}], 0x1148, 0x4008800}, {0x0, 0x0, &(0x7f000000b240)=[{&(0x7f000000b140)="3bed453cc87a1d879f13867692770c6e06085f", 0x13}, {&(0x7f000000b180)="70f875e5522071fbe33965bfd2073cd892ffa0d2dc4ab5aaab320092f5e8d488992b80ed23f1c9b420641c226241c72ce89e1413587416a52195edf0affe4f15c40e826861e97ad2fbbf0769895a5880443b4f1947c66c4d165e6739539da2c99f3bbd9844db53871bcbbc8fe3d6b30a4e1690c6f282afa3af6649c136a71b5badccc6b98eab6e291005bb0b238359433de921e4921313ac63660dec7e60a80f1e7141a0cc95f74b1573e1b66bb7842109", 0xb1}], 0x2, &(0x7f000000b280)=[@op={0x18}], 0x18, 0x40001}, {0x0, 0x0, &(0x7f000000b500)=[{&(0x7f000000b2c0)="5db8fc93f676f8f588f0dcc9a527b0a6225ecc84e7c17463af39ec134d6ce940e1b65442b7ac625aeedf3fc21fd95ecb8c790a4ee47e095c881c05d36329e93ce3132d7e8e96caef", 0x48}, {&(0x7f000000b340)="5401417dcddbaf7c19d6758b04e56599ffd524192941b30008fcd599b490ccaeb07436f68ede7888229c18ed05345e3d087703e6f30d268cbe8a58f8", 0x3c}, {&(0x7f000000b380)="490e0ff28c11394bd1c70c6e5166c2a5573ccdbdbd2838aecdb482f93b899dc028618079f393b117b88361fc1fe69586147a5e01a247b73189e600be8cfd2d47d04d4a504dfce16cda863b453fc060d41330230bd15d3956b13e29fc161cf389311c5b97821b0b", 0x67}, {&(0x7f000000b400)="ff5972d77921af7e501e4cfd3b06a6e4dad4cc2490963ff42f0d704778d0381a41570e7439b53b11fbe408b1fdd7cd9d7a608a81ff2be2a50d1853254a69bb1ab01a8b0fb5d4c68925c555cf0782e546b0a3d3dcbe4b3840e7d200c58542f902feb08a22dbeec44dba3b50bebe9f1d4177a0345af4d60bffcf11fe7603a5d50465ef2fac8f800e925bb138574112946136d7063241fcd95a8f16166d6a9f9d992d9160585e4119ba0785d8df31ab47b401722e246eff7de93c6e8f9972ee5978e7828c30717149c28c006617847bcbd9e77e1e82275cb3fd187314", 0xdb}], 0x4, &(0x7f000000b540)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0xd0, 0x117, 0x2, 0xb9, "aee65c3ed64543afc81bb854576b72251823a5a3c79c913569ba9553d0571930c6f65fa175a7bce956ae2d2bfe94e0e53f80eaa9554b239503ccabf2ecc0f6c7fff3e6fa4920fd6231f792f979fa1dc89ac411843103874c08e1a73b00174eb91fba42b4d18d91d0f6c639f6d05ae34cf2c9082fffad63009e6de3f26f52221a5d7d81d5ef79f7a61212b8b86a756be1721d8a240402ec04e493e0ea586bb951df2c58e88cb0c7491e8ccf422d6bb97dc5d14b6179df3f338e"}, @assoc={0x18, 0x117, 0x4, 0x3cb00}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x9}, @assoc={0x18, 0x117, 0x4, 0x80000000}], 0x160, 0x10}], 0x9, 0x20000045) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x1e, 0xfa, &(0x7f0000000040)="b90703e6680d698cb89e40f02ceacb9ae31e7d6a36f5908093d6df967588dbffa71b2c25841a95adea6a7dd926405cb671157a8484d81eb169db9ee4bf19c42d713cbdcb4fe038d9f40d7eabb5a9037d644e95a17b", 0x0, 0x100}, 0x28) [ 734.174980] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 12:05:33 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) chroot(&(0x7f00000001c0)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) 12:05:36 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:05:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x800000000000000, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x1ff, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0x61, 0x35f, &(0x7f0000000040)="b90703e6600d698cb89e40f02cea1dbe1667798f2216a84cbcaad4affc9a5a5281080ea3688e6e20ba01470ea84ca67a5f7db8326b9e491e6da6bc3d65af504a432ca5c1c3846a736a9e16f3f05876c3048073a6e2b4fc109f4127eb536008e202", 0x0, 0x100}, 0xb67e11a7a76eca45) pipe(&(0x7f0000000100)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)=0x1) 12:05:36 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {}, 0x6, 0x3}) 12:05:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x200000007, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x3a0, 0x10, &(0x7f0000000000)={0x2, 0x0, 0x4, 0x8de}, 0x4e}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000007a0322e3ebec63c2000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xfffffffffffffef5}, 0x48) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) bind$rds(r2, &(0x7f0000000100)={0x2, 0x4e24, @multicast2}, 0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000080)=r3) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000701000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 12:05:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe74427886e9adc3e, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x70) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "7621775b447d2ec6", "7c6f31dbd058236dd43ef807c54ebbbf", "6bd1c2bf", "63cdc71fbc0092f2"}, 0x28) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x10000, 0x80100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 737.089803] ================================================================== [ 737.097544] BUG: KASAN: slab-out-of-bounds in bpf_clone_redirect+0x2de/0x2f0 [ 737.104758] Read of size 8 at addr ffff8880a1388ed0 by task syz-executor.2/24932 [ 737.112299] [ 737.113943] CPU: 0 PID: 24932 Comm: syz-executor.2 Not tainted 4.14.133 #28 [ 737.121052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.130453] Call Trace: [ 737.133069] dump_stack+0x138/0x19c 12:05:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="fb17b72bda98d759bfa30000200000000703000000fe02007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400e000007d60b703000000000000000000fe0000deff840000000000009500000000000000f1bf84419dff62bb0d1b948c6a76e46239"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000280)) 12:05:36 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 737.136731] ? bpf_clone_redirect+0x2de/0x2f0 [ 737.141307] print_address_description.cold+0x7c/0x1dc [ 737.146630] ? bpf_clone_redirect+0x2de/0x2f0 [ 737.151151] kasan_report.cold+0xa9/0x2af [ 737.155310] __asan_report_load8_noabort+0x14/0x20 [ 737.160254] bpf_clone_redirect+0x2de/0x2f0 [ 737.164588] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 737.169363] ? SyS_bpf+0x749/0x38f3 [ 737.173019] bpf_prog_952a9deb36fe58b9+0x7e7/0x1000 [ 737.178070] ? trace_hardirqs_on+0x10/0x10 [ 737.182350] ? trace_hardirqs_on+0x10/0x10 [ 737.186624] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 737.191401] ? bpf_test_run+0x44/0x330 [ 737.195313] ? find_held_lock+0x35/0x130 [ 737.199461] ? bpf_test_run+0x44/0x330 [ 737.203384] ? lock_acquire+0x16f/0x430 [ 737.207376] ? check_preemption_disabled+0x3c/0x250 [ 737.212445] ? bpf_test_run+0xa8/0x330 [ 737.216373] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 737.221256] ? bpf_test_init.isra.0+0xe0/0xe0 [ 737.225922] ? fput+0xd4/0x150 [ 737.229408] ? __bpf_prog_get+0x153/0x1a0 [ 737.233599] ? SyS_bpf+0x749/0x38f3 12:05:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) [ 737.237276] ? bpf_test_init.isra.0+0xe0/0xe0 [ 737.241806] ? bpf_prog_get+0x20/0x20 [ 737.246147] ? kasan_check_read+0x11/0x20 [ 737.250323] ? _copy_to_user+0x87/0xd0 [ 737.254245] ? put_timespec64+0xb4/0x100 [ 737.258321] ? nsecs_to_jiffies+0x30/0x30 [ 737.262499] ? bpf_prog_get+0x20/0x20 [ 737.266314] ? do_syscall_64+0x1e8/0x640 [ 737.270388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.275258] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 737.280679] [ 737.280695] Allocated by task 7383: [ 737.280793] save_stack_trace+0x16/0x20 12:05:36 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000002c0)={r1, 0xfff}, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xc, 0x0, &(0x7f0000000080)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x7) [ 737.280804] save_stack+0x45/0xd0 [ 737.280811] kasan_kmalloc+0xce/0xf0 [ 737.280819] kasan_slab_alloc+0xf/0x20 [ 737.280829] kmem_cache_alloc+0x12e/0x780 [ 737.280839] get_empty_filp+0x8c/0x3b0 [ 737.280854] alloc_file+0x23/0x440 [ 737.280867] create_pipe_files+0x527/0x880 [ 737.290090] __do_pipe_flags+0x38/0x210 [ 737.290099] SyS_pipe2+0x69/0x120 [ 737.290109] do_syscall_64+0x1e8/0x640 [ 737.290121] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 737.290124] [ 737.290129] Freed by task 7240: [ 737.290138] save_stack_trace+0x16/0x20 [ 737.290146] save_stack+0x45/0xd0 [ 737.290157] kasan_slab_free+0x75/0xc0 [ 737.349776] kmem_cache_free+0x83/0x2b0 [ 737.353758] file_free_rcu+0x63/0xa0 [ 737.357477] rcu_process_callbacks+0x7b8/0x12b0 [ 737.362158] __do_softirq+0x244/0x9a0 [ 737.365959] [ 737.367581] The buggy address belongs to the object at ffff8880a1388cc0 [ 737.367581] which belongs to the cache filp of size 456 [ 737.379654] The buggy address is located 72 bytes to the right of [ 737.379654] 456-byte region [ffff8880a1388cc0, ffff8880a1388e88) [ 737.391961] The buggy address belongs to the page: [ 737.396893] page:ffffea000284e200 count:1 mapcount:0 mapping:ffff8880a1388040 index:0x0 [ 737.405056] flags: 0x1fffc0000000100(slab) [ 737.409287] raw: 01fffc0000000100 ffff8880a1388040 0000000000000000 0000000100000006 [ 737.417171] raw: ffffea00029f2f60 ffffea00027fd3a0 ffff8880aa9e09c0 0000000000000000 [ 737.425049] page dumped because: kasan: bad access detected [ 737.430752] [ 737.432369] Memory state around the buggy address: [ 737.437302] ffff8880a1388d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 737.444657] ffff8880a1388e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 737.452118] >ffff8880a1388e80: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 737.459489] ^ [ 737.465463] ffff8880a1388f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 737.472825] ffff8880a1388f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 737.480204] ================================================================== [ 737.487564] Disabling lock debugging due to kernel taint [ 737.494002] Kernel panic - not syncing: panic_on_warn set ... [ 737.494002] [ 737.501387] CPU: 0 PID: 24932 Comm: syz-executor.2 Tainted: G B 4.14.133 #28 [ 737.509690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.519055] Call Trace: [ 737.521658] dump_stack+0x138/0x19c [ 737.525298] ? bpf_clone_redirect+0x2de/0x2f0 [ 737.529791] panic+0x1f2/0x426 [ 737.532999] ? add_taint.cold+0x16/0x16 [ 737.537064] kasan_end_report+0x47/0x4f [ 737.541045] kasan_report.cold+0x130/0x2af [ 737.545272] __asan_report_load8_noabort+0x14/0x20 [ 737.550195] bpf_clone_redirect+0x2de/0x2f0 [ 737.554524] ? bpf_prog_test_run_skb+0x157/0x9a0 [ 737.559272] ? SyS_bpf+0x749/0x38f3 [ 737.562904] bpf_prog_952a9deb36fe58b9+0x7e7/0x1000 [ 737.567912] ? trace_hardirqs_on+0x10/0x10 [ 737.572154] ? trace_hardirqs_on+0x10/0x10 [ 737.576382] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 737.581139] ? bpf_test_run+0x44/0x330 [ 737.585019] ? find_held_lock+0x35/0x130 [ 737.589070] ? bpf_test_run+0x44/0x330 [ 737.592959] ? lock_acquire+0x16f/0x430 [ 737.596924] ? check_preemption_disabled+0x3c/0x250 [ 737.601950] ? bpf_test_run+0xa8/0x330 [ 737.605832] ? bpf_prog_test_run_skb+0x6c2/0x9a0 [ 737.610597] ? bpf_test_init.isra.0+0xe0/0xe0 [ 737.615086] ? fput+0xd4/0x150 [ 737.618268] ? __bpf_prog_get+0x153/0x1a0 [ 737.622412] ? SyS_bpf+0x749/0x38f3 [ 737.626031] ? bpf_test_init.isra.0+0xe0/0xe0 [ 737.630533] ? bpf_prog_get+0x20/0x20 [ 737.634332] ? kasan_check_read+0x11/0x20 [ 737.638480] ? _copy_to_user+0x87/0xd0 [ 737.642379] ? put_timespec64+0xb4/0x100 [ 737.646432] ? nsecs_to_jiffies+0x30/0x30 [ 737.650582] ? bpf_prog_get+0x20/0x20 [ 737.654388] ? do_syscall_64+0x1e8/0x640 [ 737.658453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.663308] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 737.669803] Kernel Offset: disabled [ 737.673448] Rebooting in 86400 seconds..