Warning: Permanently added '[localhost]:4288' (ECDSA) to the list of known hosts.
syzkaller login: [  121.099808][   T39] kauditd_printk_skb: 7 callbacks suppressed
[  121.099833][   T39] audit: type=1400 audit(1591994092.152:42): avc:  denied  { map } for  pid=8760 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16524 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1
2020/06/12 20:34:52 fuzzer started
2020/06/12 20:34:52 dialing manager at 10.0.2.10:42067
2020/06/12 20:34:53 syscalls: 3087
2020/06/12 20:34:53 code coverage: enabled
2020/06/12 20:34:53 comparison tracing: enabled
2020/06/12 20:34:53 extra coverage: enabled
2020/06/12 20:34:53 setuid sandbox: enabled
2020/06/12 20:34:53 namespace sandbox: enabled
2020/06/12 20:34:53 Android sandbox: /sys/fs/selinux/policy does not exist
2020/06/12 20:34:53 fault injection: enabled
2020/06/12 20:34:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2020/06/12 20:34:53 net packet injection: enabled
2020/06/12 20:34:53 net device setup: enabled
2020/06/12 20:34:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2020/06/12 20:34:53 devlink PCI setup: PCI device 0000:00:10.0 is not available
2020/06/12 20:34:53 USB emulation: enabled
[  122.423734][   T39] audit: type=1400 audit(1591994093.472:43): avc:  denied  { integrity } for  pid=8777 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1
20:35:07 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f00000039c0)=[{{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000740)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

[  136.112427][   T39] audit: type=1400 audit(1591994107.162:44): avc:  denied  { map } for  pid=8782 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=2079 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
20:35:07 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:07 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  136.790841][ T8785] IPVS: ftp: loaded support on port[0] = 21
[  136.790849][ T8784] IPVS: ftp: loaded support on port[0] = 21
20:35:08 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

[  137.201457][ T8787] IPVS: ftp: loaded support on port[0] = 21
[  137.441703][ T8785] chnl_net:caif_netlink_parms(): no params data found
[  137.499015][ T8784] chnl_net:caif_netlink_parms(): no params data found
[  137.541017][ T8791] IPVS: ftp: loaded support on port[0] = 21
[  137.653954][ T8787] chnl_net:caif_netlink_parms(): no params data found
[  137.713661][ T8784] bridge0: port 1(bridge_slave_0) entered blocking state
[  137.724504][ T8784] bridge0: port 1(bridge_slave_0) entered disabled state
[  137.738481][ T8784] device bridge_slave_0 entered promiscuous mode
[  137.763975][ T8784] bridge0: port 2(bridge_slave_1) entered blocking state
[  137.782867][ T8784] bridge0: port 2(bridge_slave_1) entered disabled state
[  137.797373][ T8784] device bridge_slave_1 entered promiscuous mode
[  137.807638][ T8785] bridge0: port 1(bridge_slave_0) entered blocking state
[  137.818551][ T8785] bridge0: port 1(bridge_slave_0) entered disabled state
[  137.829910][ T8785] device bridge_slave_0 entered promiscuous mode
[  137.866759][ T8785] bridge0: port 2(bridge_slave_1) entered blocking state
[  137.878794][ T8785] bridge0: port 2(bridge_slave_1) entered disabled state
[  137.893211][ T8785] device bridge_slave_1 entered promiscuous mode
[  137.919491][ T8784] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  137.949816][ T8784] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  137.985682][ T8785] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  138.016673][ T8784] team0: Port device team_slave_0 added
[  138.028817][ T8784] team0: Port device team_slave_1 added
[  138.039725][ T8785] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  138.099046][ T8785] team0: Port device team_slave_0 added
[  138.109753][ T8785] team0: Port device team_slave_1 added
[  138.129658][ T8787] bridge0: port 1(bridge_slave_0) entered blocking state
[  138.141497][ T8787] bridge0: port 1(bridge_slave_0) entered disabled state
[  138.153090][ T8787] device bridge_slave_0 entered promiscuous mode
[  138.165440][ T8787] bridge0: port 2(bridge_slave_1) entered blocking state
[  138.177941][ T8787] bridge0: port 2(bridge_slave_1) entered disabled state
[  138.189404][ T8787] device bridge_slave_1 entered promiscuous mode
[  138.214468][ T8784] batman_adv: batadv0: Adding interface: batadv_slave_0
[  138.225747][ T8784] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  138.261049][ T8784] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  138.284135][ T8784] batman_adv: batadv0: Adding interface: batadv_slave_1
[  138.293418][ T8784] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  138.327713][ T8784] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  138.364111][ T8785] batman_adv: batadv0: Adding interface: batadv_slave_0
[  138.373522][ T8785] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  138.411283][ T8785] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  138.428726][ T8787] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  138.455315][ T8787] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  138.482202][ T8785] batman_adv: batadv0: Adding interface: batadv_slave_1
[  138.492089][ T8785] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  138.527261][ T8785] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  138.591984][ T8791] chnl_net:caif_netlink_parms(): no params data found
[  138.608512][ T8787] team0: Port device team_slave_0 added
[  138.679956][ T8784] device hsr_slave_0 entered promiscuous mode
[  138.755856][ T8784] device hsr_slave_1 entered promiscuous mode
[  138.834514][ T8787] team0: Port device team_slave_1 added
[  138.898695][ T8785] device hsr_slave_0 entered promiscuous mode
[  138.974157][ T8785] device hsr_slave_1 entered promiscuous mode
[  139.035826][ T8785] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  139.054241][ T8785] Cannot create hsr debugfs directory
[  139.105005][ T8787] batman_adv: batadv0: Adding interface: batadv_slave_0
[  139.113199][ T8787] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  139.144696][ T8787] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  139.188373][ T8787] batman_adv: batadv0: Adding interface: batadv_slave_1
[  139.196925][ T8787] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  139.229178][ T8787] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  139.288908][ T8791] bridge0: port 1(bridge_slave_0) entered blocking state
[  139.298181][ T8791] bridge0: port 1(bridge_slave_0) entered disabled state
[  139.308577][ T8791] device bridge_slave_0 entered promiscuous mode
[  139.342268][ T8791] bridge0: port 2(bridge_slave_1) entered blocking state
[  139.351616][ T8791] bridge0: port 2(bridge_slave_1) entered disabled state
[  139.362144][ T8791] device bridge_slave_1 entered promiscuous mode
[  139.457615][ T8787] device hsr_slave_0 entered promiscuous mode
[  139.524254][ T8787] device hsr_slave_1 entered promiscuous mode
[  139.583877][ T8787] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  139.595548][ T8787] Cannot create hsr debugfs directory
[  139.616363][ T8791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  139.648216][ T8791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  139.747492][ T8791] team0: Port device team_slave_0 added
[  139.765658][ T8791] team0: Port device team_slave_1 added
[  139.817188][ T8791] batman_adv: batadv0: Adding interface: batadv_slave_0
[  139.828154][ T8791] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  139.867081][ T8791] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  139.888851][ T8791] batman_adv: batadv0: Adding interface: batadv_slave_1
[  139.902418][   T39] audit: type=1400 audit(1591994110.952:45): avc:  denied  { create } for  pid=8784 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  139.905453][ T8791] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  139.905473][ T8791] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  139.919059][ T8784] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  139.946341][   T39] audit: type=1400 audit(1591994110.952:46): avc:  denied  { write } for  pid=8784 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  140.047674][   T39] audit: type=1400 audit(1591994110.952:47): avc:  denied  { read } for  pid=8784 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  140.122924][ T8784] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  140.198274][ T8784] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  140.271444][ T8784] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  140.427746][ T8791] device hsr_slave_0 entered promiscuous mode
[  140.525949][ T8791] device hsr_slave_1 entered promiscuous mode
[  140.594160][ T8791] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  140.608293][ T8791] Cannot create hsr debugfs directory
[  140.628603][ T8785] netdevsim netdevsim1 netdevsim0: renamed from eth0
[  140.720515][ T8785] netdevsim netdevsim1 netdevsim1: renamed from eth1
[  140.810113][ T8785] netdevsim netdevsim1 netdevsim2: renamed from eth2
[  140.909993][ T8785] netdevsim netdevsim1 netdevsim3: renamed from eth3
[  141.010590][ T8787] netdevsim netdevsim2 netdevsim0: renamed from eth0
[  141.069837][ T8787] netdevsim netdevsim2 netdevsim1: renamed from eth1
[  141.178311][ T8787] netdevsim netdevsim2 netdevsim2: renamed from eth2
[  141.259881][ T8787] netdevsim netdevsim2 netdevsim3: renamed from eth3
[  141.477643][ T8791] netdevsim netdevsim3 netdevsim0: renamed from eth0
[  141.547895][ T8791] netdevsim netdevsim3 netdevsim1: renamed from eth1
[  141.659387][ T8791] netdevsim netdevsim3 netdevsim2: renamed from eth2
[  141.719866][ T8791] netdevsim netdevsim3 netdevsim3: renamed from eth3
[  141.905325][ T8784] 8021q: adding VLAN 0 to HW filter on device bond0
[  141.922827][ T8785] 8021q: adding VLAN 0 to HW filter on device bond0
[  141.952557][ T8787] 8021q: adding VLAN 0 to HW filter on device bond0
[  141.971872][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  141.985458][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  142.003398][ T8784] 8021q: adding VLAN 0 to HW filter on device team0
[  142.028625][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  142.039658][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  142.055452][ T8785] 8021q: adding VLAN 0 to HW filter on device team0
[  142.077599][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  142.090372][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  142.102770][   T35] bridge0: port 1(bridge_slave_0) entered blocking state
[  142.111704][   T35] bridge0: port 1(bridge_slave_0) entered forwarding state
[  142.129298][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  142.141548][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  142.153273][   T35] bridge0: port 1(bridge_slave_0) entered blocking state
[  142.162994][   T35] bridge0: port 1(bridge_slave_0) entered forwarding state
[  142.172510][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  142.182950][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  142.193401][   T35] bridge0: port 2(bridge_slave_1) entered blocking state
[  142.201946][   T35] bridge0: port 2(bridge_slave_1) entered forwarding state
[  142.217500][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  142.227520][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  142.237166][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  142.247565][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  142.275058][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  142.290464][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  142.306484][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  142.320348][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  142.335428][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  142.349618][ T1213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  142.368513][ T1213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  142.382811][ T1213] bridge0: port 2(bridge_slave_1) entered blocking state
[  142.393839][ T1213] bridge0: port 2(bridge_slave_1) entered forwarding state
[  142.408229][ T8787] 8021q: adding VLAN 0 to HW filter on device team0
[  142.430260][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  142.441466][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  142.451854][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  142.468175][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  142.481054][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  142.508029][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  142.520401][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  142.531101][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  142.542253][   T59] bridge0: port 1(bridge_slave_0) entered blocking state
[  142.552063][   T59] bridge0: port 1(bridge_slave_0) entered forwarding state
[  142.563111][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  142.581498][ T8791] 8021q: adding VLAN 0 to HW filter on device bond0
[  142.599150][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  142.610919][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  142.622466][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  142.635073][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  142.646957][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  142.659343][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  142.671418][ T2451] bridge0: port 2(bridge_slave_1) entered blocking state
[  142.681521][ T2451] bridge0: port 2(bridge_slave_1) entered forwarding state
[  142.692481][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  142.705959][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  142.734132][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  142.748108][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  142.760751][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  142.774942][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  142.800518][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  142.811483][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  142.822257][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  142.836090][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  142.848046][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  142.859845][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  142.871036][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  142.883139][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  142.898505][ T8791] 8021q: adding VLAN 0 to HW filter on device team0
[  142.913704][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  142.929531][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  142.949931][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  142.965093][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  142.978415][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  142.992095][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  143.027379][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  143.045463][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  143.059728][   T35] bridge0: port 1(bridge_slave_0) entered blocking state
[  143.070430][   T35] bridge0: port 1(bridge_slave_0) entered forwarding state
[  143.084503][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  143.095146][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  143.105129][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  143.116269][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  143.127170][   T35] bridge0: port 2(bridge_slave_1) entered blocking state
[  143.136477][   T35] bridge0: port 2(bridge_slave_1) entered forwarding state
[  143.153201][ T8784] 8021q: adding VLAN 0 to HW filter on device batadv0
[  143.165604][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  143.175968][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  143.200754][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  143.212846][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  143.229076][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  143.252442][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  143.267155][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  143.278297][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  143.289256][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  143.301938][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  143.315019][   T59] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  143.342745][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  143.357664][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  143.371141][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  143.383116][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  143.394908][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  143.408192][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  143.424917][ T8785] 8021q: adding VLAN 0 to HW filter on device batadv0
[  143.448521][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  143.465009][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  143.483345][ T8787] 8021q: adding VLAN 0 to HW filter on device batadv0
[  143.504228][ T8791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  143.526751][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  143.538960][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  143.564793][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  143.581199][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  143.608243][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  143.622510][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  143.647884][ T8784] device veth0_vlan entered promiscuous mode
[  143.661034][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  143.675419][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  143.707425][ T8785] device veth0_vlan entered promiscuous mode
[  143.727557][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  143.739759][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  143.755307][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  143.769947][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  143.786821][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  143.799308][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  143.820258][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  143.831564][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  143.843005][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  143.854338][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  143.871626][ T8787] device veth0_vlan entered promiscuous mode
[  143.888474][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  143.901059][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  143.919633][ T8784] device veth1_vlan entered promiscuous mode
[  143.934760][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  143.956563][ T8791] 8021q: adding VLAN 0 to HW filter on device batadv0
[  143.970436][ T8785] device veth1_vlan entered promiscuous mode
[  143.985997][ T8787] device veth1_vlan entered promiscuous mode
[  144.025225][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  144.038396][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  144.072837][ T1213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  144.085154][ T1213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  144.102127][ T8784] device veth0_macvtap entered promiscuous mode
[  144.119071][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  144.131375][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  144.143165][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  144.155495][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  144.166769][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  144.178734][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  144.189322][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  144.205238][ T8784] device veth1_macvtap entered promiscuous mode
[  144.216859][ T8791] device veth0_vlan entered promiscuous mode
[  144.231755][ T8785] device veth0_macvtap entered promiscuous mode
[  144.249080][ T8785] device veth1_macvtap entered promiscuous mode
[  144.269168][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  144.285953][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  144.297531][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  144.309468][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  144.325941][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  144.345526][ T8791] device veth1_vlan entered promiscuous mode
[  144.362061][ T8787] device veth0_macvtap entered promiscuous mode
[  144.384715][ T8784] batman_adv: batadv0: Interface activated: batadv_slave_0
[  144.401003][ T8785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  144.418452][ T8785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  144.434196][ T8785] batman_adv: batadv0: Interface activated: batadv_slave_0
[  144.449854][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  144.465931][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  144.481059][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  144.502465][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  144.519669][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  144.542976][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  144.573461][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  144.610914][ T8787] device veth1_macvtap entered promiscuous mode
[  144.646413][ T8784] batman_adv: batadv0: Interface activated: batadv_slave_1
[  144.678235][ T8785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  144.710171][ T8785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  144.738536][ T8785] batman_adv: batadv0: Interface activated: batadv_slave_1
[  144.769041][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  144.801174][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  144.826161][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  144.847746][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  144.872429][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  145.068181][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  145.083520][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  145.104987][ T8791] device veth0_macvtap entered promiscuous mode
[  145.179548][ T8791] device veth1_macvtap entered promiscuous mode
[  145.245769][ T8787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  145.269034][ T8787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  145.292749][ T8787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  145.312783][ T8787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  145.338710][ T8787] batman_adv: batadv0: Interface activated: batadv_slave_0
[  145.495670][   T39] audit: type=1400 audit(1591994116.542:48): avc:  denied  { associate } for  pid=8785 comm="syz-executor.1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
[  145.597768][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  145.612712][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  145.631434][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  145.668611][ T8787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  145.692502][ T8787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  145.714299][ T8787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  145.733971][ T8787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  145.758140][ T8787] batman_adv: batadv0: Interface activated: batadv_slave_1
[  145.788299][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  145.810015][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  145.834043][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  145.853359][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  145.872711][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  145.899539][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  145.922072][ T8791] batman_adv: batadv0: Interface activated: batadv_slave_0
[  145.939300][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  145.941411][ T8785] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation
[  145.957446][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  145.999134][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  146.028208][   T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  146.070746][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  146.143351][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  146.151993][   T39] audit: type=1400 audit(1591994117.202:49): avc:  denied  { open } for  pid=8812 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1
[  146.172746][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  146.230645][   T39] audit: type=1400 audit(1591994117.202:50): avc:  denied  { perfmon } for  pid=8812 comm="syz-executor.1" capability=38  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1
[  146.230762][   T39] audit: type=1400 audit(1591994117.202:51): avc:  denied  { kernel } for  pid=8812 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1
[  146.230779][   T39] audit: type=1400 audit(1591994117.202:52): avc:  denied  { confidentiality } for  pid=8812 comm="syz-executor.1" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1
[  146.454950][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  146.476943][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  146.502901][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  146.537448][ T8791] batman_adv: batadv0: Interface activated: batadv_slave_1
[  146.588102][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  146.609069][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
20:35:17 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:17 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:18 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:18 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
sendmmsg(0xffffffffffffffff, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:18 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f00000039c0)=[{{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000740)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

20:35:18 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
sendmmsg(0xffffffffffffffff, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

[  147.788650][    T0] NOHZ: local_softirq_pending 08
20:35:21 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f00000039c0)=[{{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000740)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

20:35:21 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:21 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
sendmmsg(0xffffffffffffffff, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:21 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:21 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f00000039c0)=[{{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000740)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

20:35:21 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:21 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:21 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:21 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:21 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:21 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:21 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
dup(r1)

20:35:21 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:21 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(r0, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:21 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)

20:35:24 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:24 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:24 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:35:24 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(r0, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:24 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(r0, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:24 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)

20:35:24 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:24 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:27 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:27 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)

20:35:27 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)
recvmmsg(0xffffffffffffffff, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:27 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:27 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:27 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)
recvmmsg(0xffffffffffffffff, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:27 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)

20:35:27 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:27 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)
recvmmsg(0xffffffffffffffff, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:27 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:27 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)

20:35:27 executing program 0:
socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)

20:35:27 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:27 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)
recvmmsg(r1, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:27 executing program 0:
socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)

20:35:30 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)
recvmmsg(r1, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:30 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:30 executing program 0:
socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)

20:35:30 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:30 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)

20:35:30 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:30 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)
recvmmsg(r1, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:30 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)

20:35:30 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:30 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:33 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:33 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)

20:35:33 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:33 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:33 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:33 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:33 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:33 executing program 0:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:36 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:36 executing program 0:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:36 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
accept$alg(r0, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:36 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:36 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:36 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
accept$alg(r0, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:36 executing program 0:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:36 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
accept$alg(r0, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:35:36 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r1 = dup(r0)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)
recvmmsg(r1, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:36 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:36 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:36 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r1 = dup(r0)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)
recvmmsg(r1, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:36 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, 0x0, 0x0, 0x0)

20:35:36 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r1 = dup(r0)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)
recvmmsg(r1, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:36 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:36 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, 0x0, 0x0, 0x0)

20:35:36 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, 0x0, 0x0, 0x0)

20:35:39 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:39 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:39 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}], 0x1, 0x0)

20:35:39 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:39 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}], 0x1, 0x0)

20:35:39 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:39 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:40 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:40 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)

20:35:40 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}], 0x1, 0x0)

20:35:40 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

[  169.536913][    T0] NOHZ: local_softirq_pending 08
20:35:42 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)

20:35:42 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{0x0, 0x0, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:42 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:42 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:42 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{0x0, 0x0, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:42 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)

20:35:42 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:43 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:43 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{0x0, 0x0, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:43 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:43 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)

20:35:43 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, 0x0, 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:43 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:43 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)

20:35:43 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:46 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:46 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)

20:35:46 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, 0x0, 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:46 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:46 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, 0x0, 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:46 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:46 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:46 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0)}}], 0x2, 0x0)

20:35:49 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:49 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:49 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:49 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0)}}], 0x2, 0x0)

20:35:49 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0)}}], 0x2, 0x0)

20:35:49 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:49 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:49 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x1, 0x0)

20:35:49 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:49 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:49 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x1, 0x0)

20:35:49 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:49 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:49 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:49 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x1, 0x0)

20:35:49 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:49 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:49 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
dup(r3)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:49 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:49 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:49 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r1 = dup(r0)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)

20:35:49 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:49 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:49 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r1 = dup(r0)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)

20:35:49 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:52 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:52 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r1 = dup(r0)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)

20:35:52 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:52 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
dup(r3)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:52 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:52 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:52 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:52 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:52 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:52 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:52 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:55 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff})
dup(r3)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:55 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:55 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0)

20:35:55 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:55 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:55 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:55 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:55 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:58 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:58 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:58 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:58 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:58 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:58 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:58 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:58 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:58 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:58 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:58 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:58 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:58 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:58 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:35:58 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:58 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:58 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:58 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
dup(r1)

20:35:58 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:35:58 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:35:58 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)

20:36:01 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:01 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:01 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:01 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:01 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:01 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:01 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:01 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:01 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:04 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:04 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)
recvmmsg(r1, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:04 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:04 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:04 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:04 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)
recvmmsg(r1, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:04 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:04 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:04 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)
recvmmsg(r1, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:04 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:04 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:07 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:07 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:07 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:07 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:07 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:07 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:07 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:07 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:07 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:07 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:07 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:10 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:10 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:10 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:10 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:10 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(0xffffffffffffffff, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:10 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:10 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:10 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:13 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:13 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(0xffffffffffffffff, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:13 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000080)=0xc)
r2 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:13 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:13 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:13 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:13 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(0xffffffffffffffff, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:13 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:13 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:14 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, 0x0, 0x0, 0x0, 0x0)

20:36:16 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000080)=0xc)
r2 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:16 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:16 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:16 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, 0x0, 0x0, 0x0, 0x0)

20:36:16 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:16 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, 0x0, 0x0, 0x0, 0x0)

20:36:16 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)

20:36:16 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980), 0x0, 0x0, 0x0)

20:36:19 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)

20:36:19 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:19 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980), 0x0, 0x0, 0x0)

20:36:19 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000080)=0xc)
r2 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:19 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:19 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980), 0x0, 0x0, 0x0)

20:36:19 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)

20:36:19 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:20 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)

20:36:20 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)

20:36:20 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

[  209.221715][    T0] NOHZ: local_softirq_pending 08
20:36:22 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0)

20:36:22 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)

20:36:22 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)

20:36:22 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:22 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:22 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0)

20:36:22 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)

20:36:22 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)

20:36:23 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0)

20:36:23 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:23 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)}}], 0x1, 0x0, 0x0)

20:36:23 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:23 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)

20:36:23 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18)

20:36:23 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)}}], 0x1, 0x0, 0x0)

20:36:23 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
accept$alg(r0, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2)

20:36:23 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:23 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18)

20:36:23 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
dup(r1)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)

20:36:23 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)}}], 0x1, 0x0, 0x0)

20:36:23 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0)

20:36:23 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
dup(r1)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)

20:36:23 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18)

20:36:23 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
dup(r1)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2)

20:36:26 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24)

20:36:26 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0)

20:36:26 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, 0x0, 0x0)

20:36:26 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:26 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24)

20:36:26 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0)

20:36:26 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, 0x0, 0x0)

20:36:26 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, 0x0, 0x0)

20:36:26 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24)

20:36:26 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a)

20:36:26 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup(r1)
write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2)
recvmmsg(r2, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/45, 0xfff2}], 0x1}}], 0x1, 0x0, 0x0)

20:36:29 executing program 0:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0)

20:36:29 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a)

20:36:29 executing program 3:
add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x20000214, 0x0)

20:36:29 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:29 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:29 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a)

20:36:29 executing program 3:
add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x20000214, 0x0)

20:36:29 executing program 0:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0)
listen(0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4)
bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10)
sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0)
open(0x0, 0x10000, 0x40)

20:36:29 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d)

20:36:29 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:29 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d)

20:36:29 executing program 3:
add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x20000214, 0x0)

20:36:29 executing program 3:
add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x20000214, 0x0)

20:36:29 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d)

20:36:29 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000080)=0xc)
r2 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, 0x0, 0x0, 0x0)

20:36:29 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f)

20:36:29 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000080)=0xc)
r2 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, 0x0, 0x0, 0x0)

20:36:29 executing program 3:
add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x0, 0x0)

20:36:29 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f)

20:36:29 executing program 3:
add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x0, 0x0)

20:36:29 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000080)=0xc)
r2 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, 0x0, 0x0, 0x0)

20:36:29 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f)

[  218.920606][    C2] hrtimer: interrupt took 39436343 ns
20:36:30 executing program 0:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0)
listen(0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4)
bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10)
sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0)
open(0x0, 0x10000, 0x40)

20:36:30 executing program 3:
add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x0, 0x0)

20:36:31 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:31 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0)
listen(0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4)
bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10)
sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0)
open(0x0, 0x10000, 0x40)

20:36:31 executing program 3:
add_key(&(0x7f0000000140)='ceph\x00', 0x0, &(0x7f0000000040), 0x0, 0x0)

20:36:31 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:31 executing program 3:
add_key(&(0x7f0000000140)='ceph\x00', 0x0, &(0x7f0000000040), 0x0, 0x0)

20:36:31 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d8", 0x1e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000080)=0xc)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:36:31 executing program 0:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0)
listen(0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4)
bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10)
sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0)
open(0x0, 0x10000, 0x40)

20:36:31 executing program 3:
add_key(&(0x7f0000000140)='ceph\x00', 0x0, &(0x7f0000000040), 0x0, 0x0)

[  220.892923][ T9789] ptrace attach of "/syz-executor.2"[9788] was attempted by "/syz-executor.2"[9789]
[  221.036207][    C1] ==================================================================
[  221.089376][    C1] BUG: KASAN: use-after-free in sock_def_write_space+0x613/0x640
[  221.127513][ T9810] ptrace attach of "/syz-executor.2"[9808] was attempted by "/syz-executor.2"[9810]
[  221.161196][    C1] Read of size 8 at addr ffff88801251f5c0 by task ksoftirqd/1/17
[  221.161196][    C1] 
[  221.161196][    C1] CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted 5.7.0-syzkaller #0
[  221.161196][    C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[  221.161196][    C1] Call Trace:
[  221.161196][    C1]  dump_stack+0x188/0x20d
[  221.161196][    C1]  ? sock_def_write_space+0x613/0x640
[  221.161196][    C1]  ? sock_def_write_space+0x613/0x640
[  221.161196][    C1]  print_address_description.constprop.0.cold+0xd3/0x413
[  221.161196][    C1]  ? vprintk_func+0x97/0x1a6
[  221.161196][    C1]  ? sock_def_write_space+0x613/0x640
[  221.161196][    C1]  kasan_report.cold+0x1f/0x37
[  221.161196][    C1]  ? sock_def_write_space+0x613/0x640
[  221.161196][    C1]  sock_def_write_space+0x613/0x640
[  221.161196][    C1]  sock_wfree+0x1cc/0x240
[  221.161196][    C1]  ? sk_common_release+0x370/0x370
[  221.161196][    C1]  skb_release_head_state+0xe2/0x250
[  221.161196][    C1]  skb_release_all+0x11/0x60
[  221.161196][    C1]  consume_skb+0xf3/0x400
[  221.161196][    C1]  __dev_kfree_skb_any+0x9c/0xc0
[  221.161196][    C1]  napi_consume_skb+0x40d/0x5c0
[  221.161196][    C1]  free_old_xmit_skbs+0xd6/0x230
[  221.161196][    C1]  ? virtnet_set_coalesce+0x2a0/0x2a0
[  221.161196][    C1]  ? debug_smp_processor_id+0x2f/0x185
[  221.161196][    C1]  start_xmit+0x11f/0x1620
[  221.161196][    C1]  dev_hard_start_xmit+0x1a4/0x9b0
[  221.161196][    C1]  sch_direct_xmit+0x345/0xc20
[  221.161196][    C1]  ? debug_smp_processor_id+0x2f/0x185
[  222.224506][    C1]  ? dev_watchdog+0xc90/0xc90
[  222.224506][    C1]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  222.224506][    C1]  __qdisc_run+0x4d1/0x17b0
[  222.224506][    C1]  net_tx_action+0x548/0xd20
[  222.504876][    C1]  __do_softirq+0x26c/0x9f7
[  222.504876][    C1]  ? takeover_tasklets+0x810/0x810
[  222.504876][    C1]  run_ksoftirqd+0x89/0x100
[  222.504876][    C1]  smpboot_thread_fn+0x653/0x9e0
[  222.646543][    C1]  ? __smpboot_create_thread.part.0+0x340/0x340
[  222.674083][    C1]  ? __kthread_parkme+0x13f/0x1e0
[  222.703864][    C1]  ? __smpboot_create_thread.part.0+0x340/0x340
[  222.726389][    C1]  kthread+0x388/0x470
[  222.746529][    C1]  ? kthread_mod_delayed_work+0x1a0/0x1a0
[  222.766434][    C1]  ? kthread_mod_delayed_work+0x1a0/0x1a0
[  222.806589][    C1]  ret_from_fork+0x24/0x30
[  222.815651][    C1] 
[  222.834131][    C1] Allocated by task 9768:
[  222.866453][    C1]  save_stack+0x1b/0x40
[  222.894347][    C1]  __kasan_kmalloc.constprop.0+0xbf/0xd0
[  222.934210][    C1]  kmem_cache_alloc+0x11b/0x740
[  222.966970][    C1]  sock_alloc_inode+0x18/0x1c0
[  223.006719][    C1]  alloc_inode+0x61/0x1e0
[  223.046781][    C1]  new_inode_pseudo+0x14/0xe0
[  223.074282][    C1]  sock_alloc+0x3c/0x260
[  223.074282][    C1]  __sock_create+0xba/0x730
[  223.074282][    C1]  __sys_socket+0xef/0x200
[  223.074282][    C1]  __x64_sys_socket+0x6f/0xb0
[  223.074282][    C1]  do_syscall_64+0xf6/0x7d0
[  223.074282][    C1]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  223.412024][    C1] 
[  223.412024][    C1] Freed by task 8761:
[  223.412024][    C1]  save_stack+0x1b/0x40
[  223.412024][    C1]  __kasan_slab_free+0xf7/0x140
[  223.412024][    C1]  kmem_cache_free+0x7f/0x320
[  223.412024][    C1]  i_callback+0x3f/0x70
[  223.412024][    C1]  rcu_core+0x59f/0x1370
[  223.804424][    C1]  __do_softirq+0x26c/0x9f7
[  223.858464][    C1] 
[  223.884486][    C1] The buggy address belongs to the object at ffff88801251f540
[  223.884486][    C1]  which belongs to the cache sock_inode_cache(17:syz1) of size 1216
[  224.044346][    C1] The buggy address is located 128 bytes inside of
[  224.044346][    C1]  1216-byte region [ffff88801251f540, ffff88801251fa00)
[  224.164315][    C1] The buggy address belongs to the page:
[  224.217276][    C1] page:ffffea00004947c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88801251fffd
[  224.306236][    C1] flags: 0xfffe0000000200(slab)
[  224.324332][    C1] raw: 00fffe0000000200 ffffea000049b208 ffffea00006fbd88 ffff888027299c40
[  224.406804][    C1] raw: ffff88801251fffd ffff88801251f000 0000000100000003 0000000000000000
[  224.446610][    C1] page dumped because: kasan: bad access detected
[  224.486738][    C1] 
[  224.486738][    C1] Memory state around the buggy address:
[  224.527545][    C1]  ffff88801251f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  224.587065][    C1]  ffff88801251f500: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
[  224.607063][    C1] >ffff88801251f580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  224.607063][    C1]                                            ^
[  224.607063][    C1]  ffff88801251f600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  224.607063][    C1]  ffff88801251f680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  224.986915][    C1] ==================================================================
[  225.046706][    C1] Disabling lock debugging due to kernel taint
[  225.116895][    C1] Kernel panic - not syncing: panic_on_warn set ...
[  225.164249][    C1] CPU: 1 PID: 17 Comm: ksoftirqd/1 Tainted: G    B             5.7.0-syzkaller #0
[  225.226267][    C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[  225.304804][    C1] Call Trace:
[  225.325227][    C1]  dump_stack+0x188/0x20d
[  225.374232][    C1]  ? sock_def_write_space+0x530/0x640
[  225.404307][    C1]  panic+0x2e3/0x75c
[  225.439703][    C1]  ? add_taint.cold+0x16/0x16
[  225.464061][    C1]  ? sock_def_write_space+0x613/0x640
[  225.503978][    C1]  ? trace_hardirqs_on+0x55/0x230
[  225.524222][    C1]  ? sock_def_write_space+0x613/0x640
[  225.554059][    C1]  ? sock_def_write_space+0x613/0x640
[  225.595474][    C1]  end_report+0x4d/0x53
[  225.624682][    C1]  kasan_report.cold+0xd/0x37
[  225.633986][    C1]  ? sock_def_write_space+0x613/0x640
[  225.656197][    C1]  sock_def_write_space+0x613/0x640
[  225.674370][    C1]  sock_wfree+0x1cc/0x240
[  225.703968][    C1]  ? sk_common_release+0x370/0x370
[  225.724141][    C1]  skb_release_head_state+0xe2/0x250
[  225.744072][    C1]  skb_release_all+0x11/0x60
[  225.763898][    C1]  consume_skb+0xf3/0x400
[  225.763898][    C1]  __dev_kfree_skb_any+0x9c/0xc0
[  225.794138][    C1]  napi_consume_skb+0x40d/0x5c0
[  225.814340][    C1]  free_old_xmit_skbs+0xd6/0x230
[  225.844501][    C1]  ? virtnet_set_coalesce+0x2a0/0x2a0
[  225.853997][    C1]  ? debug_smp_processor_id+0x2f/0x185
[  225.874688][    C1]  start_xmit+0x11f/0x1620
[  225.904121][    C1]  dev_hard_start_xmit+0x1a4/0x9b0
[  225.934313][    C1]  sch_direct_xmit+0x345/0xc20
[  225.954856][    C1]  ? debug_smp_processor_id+0x2f/0x185
[  225.974976][    C1]  ? dev_watchdog+0xc90/0xc90
[  226.004962][    C1]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  226.035486][    C1]  __qdisc_run+0x4d1/0x17b0
[  226.054932][    C1]  net_tx_action+0x548/0xd20
[  226.064564][    C1]  __do_softirq+0x26c/0x9f7
[  226.104872][    C1]  ? takeover_tasklets+0x810/0x810
[  226.125779][    C1]  run_ksoftirqd+0x89/0x100
[  226.154409][    C1]  smpboot_thread_fn+0x653/0x9e0
[  226.163945][    C1]  ? __smpboot_create_thread.part.0+0x340/0x340
[  226.174505][    C1]  ? __kthread_parkme+0x13f/0x1e0
[  226.193941][    C1]  ? __smpboot_create_thread.part.0+0x340/0x340
[  226.214782][    C1]  kthread+0x388/0x470
[  226.214782][    C1]  ? kthread_mod_delayed_work+0x1a0/0x1a0
[  226.235002][    C1]  ? kthread_mod_delayed_work+0x1a0/0x1a0
[  226.255163][    C1]  ret_from_fork+0x24/0x30
[  226.275147][    C1] Kernel Offset: disabled
[  226.275147][    C1] Rebooting in 86400 seconds..