0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:20 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:16:20 executing program 5: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:16:20 executing program 4: ppoll(&(0x7f0000000380)=[{}], 0x1, &(0x7f0000000400), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18Y\xb1k{<~\xa6w\xc0?Mb\\\xaf\xe2\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6p3\v\xacH\x9a\x9a\t\xbex\xda\x9b\xcc\xfex\x19y\x15\xe5\x85\xa4\xe2h\x88\xe0&h7\v\x8f\xc2$\xa3\x03Y\xbe\x1a\x01k\x12\xa0O\xac\xdf\xe0f\xea\xe1l\xcb\xf337\xc4\xb8G\x11\xf0\xe8\n\x7f\xc6\x01\x805k\xaf9\xea\xfc*\xb8Dq \xd1\xa0y\xd3\xee\x87\\\x88\xe5\x04\x17UA\xbe\xf6\xb5!\x85Vq\xf9C\xb9\x85\'\x19') close(r0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r0, r1, 0x0, 0x40000000009) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) 12:16:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x880000000000010, 0x802, 0x0) write(r1, &(0x7f0000000040)="240000001a0025f0046bbc04fef7001c020b49ff00000000800008000800040001000000", 0x24) 12:16:21 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:16:21 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x880000000000010, 0x802, 0x0) write(r1, &(0x7f0000000040)="240000001a0025f0046bbc04fef7001c020b49ff00000000800008000800040001000000", 0x24) 12:16:21 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x880000000000010, 0x802, 0x0) write(r1, &(0x7f0000000040)="240000001a0025f0046bbc04fef7001c020b49ff00000000800008000800040001000000", 0x24) 12:16:21 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r1}, 0x8) 12:16:21 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x3ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x40) listen(r0, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xe2, &(0x7f0000000140)="7e0379833f30e8c66f7ab85abecc5b2364f437b2ad7f77f0b74bd4c0a1be9ce688c512d404aa48e7101aad10ab11904e648d588fdd67d4641cac4ed0f006e4e55023b14191b820cb72e45326e93dc0c4db9ec7082fbf7add04eb885138aac3899ae6b80ba945bca799911d47eedc49521d5ecbde217186f41b820968521f6b3e52b5b8dfaf57f392c2d7442f71ba36f66037d9388ea3d34289c7c36d343c952611b9a79bd03fb930c10ef7b5f4aabda7283c9fbbb1da30215fcfdf787522f31d520006454e27d54374050a2c9c461043addce35168f5a5f122ff8af6a22e4f2fb778"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioprio_set$pid(0x3, 0x0, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c0000000000000f}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000480)=0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0xffff, 0xc000, 0x0, 0x0, 0x0, 0x3, 0x2, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x0, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x2, 0x101, 0x280}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) utime(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)={0x5, 0x7ff}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 12:16:21 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r0, r1) 12:16:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) 12:16:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) 12:16:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r0, r1) 12:16:21 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r0, r1) 12:16:21 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:21 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r0, r1) [ 1833.065117] serio: Serial port ptm0 12:16:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r1}, 0x8) 12:16:22 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r0, r1) 12:16:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) 12:16:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) 12:16:22 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r0, r1) 12:16:22 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) [ 1833.507138] serio: Serial port ptm0 12:16:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r1}, 0x8) 12:16:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) 12:16:22 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r0, r1) [ 1833.812688] serio: Serial port ptm0 12:16:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) 12:16:22 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) [ 1833.987705] serio: Serial port ptm0 12:16:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r1}, 0x8) 12:16:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) 12:16:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) 12:16:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) 12:16:23 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) [ 1834.431107] serio: Serial port ptm0 12:16:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) 12:16:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r1}, 0x8) 12:16:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) 12:16:23 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) [ 1834.699412] serio: Serial port ptm0 12:16:23 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/114, 0x72}], 0x1) ioctl$KDGETMODE(r0, 0x5437, 0x0) [ 1834.970446] serio: Serial port ptm0 12:16:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r1}, 0x8) 12:16:24 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r1}, 0x8) 12:16:24 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:24 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 12:16:24 executing program 2: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xb) 12:16:25 executing program 2: clone(0x3002001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast2, @ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x122}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 12:16:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) 12:16:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000280)='GPL\x00', 0x3ca, 0x1000, &(0x7f0000001100)=""/4096}, 0x48) 12:16:25 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 12:16:25 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 12:16:25 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) 12:16:25 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 12:16:25 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) r1 = msgget(0x2, 0x100) msgsnd(r1, &(0x7f0000004a40)={0x2, "29306ade656f61063b73d7b1be3f0ad9c63c891e20d3f840ecc87ea949239c654d10662333a91f0f6007"}, 0x32, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}]}, 0x14, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x588e, &(0x7f0000000240)=ANY=[@ANYRES64=0x0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x200000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x2]}, 0x6) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x2100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x5}, 0x8) time(&(0x7f00000000c0)) 12:16:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000280)='GPL\x00', 0x3ca, 0x1000, &(0x7f0000001100)=""/4096}, 0x48) 12:16:25 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 12:16:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) 12:16:25 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 12:16:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000280)='GPL\x00', 0x3ca, 0x1000, &(0x7f0000001100)=""/4096}, 0x48) 12:16:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) 12:16:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) 12:16:26 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) [ 1837.296909] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.303469] buffer_io_error: 21 callbacks suppressed [ 1837.303479] Buffer I/O error on dev loop0, logical block 0, async page read [ 1837.340877] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.347380] Buffer I/O error on dev loop0, logical block 0, async page read [ 1837.356259] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.362777] Buffer I/O error on dev loop0, logical block 0, async page read [ 1837.371505] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.377992] Buffer I/O error on dev loop0, logical block 0, async page read 12:16:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) 12:16:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000280)='GPL\x00', 0x3ca, 0x1000, &(0x7f0000001100)=""/4096}, 0x48) 12:16:26 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) [ 1837.404700] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.411178] Buffer I/O error on dev loop0, logical block 0, async page read [ 1837.456437] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.462927] Buffer I/O error on dev loop0, logical block 0, async page read [ 1837.488833] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.495379] Buffer I/O error on dev loop0, logical block 0, async page read [ 1837.524495] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.530985] Buffer I/O error on dev loop0, logical block 0, async page read [ 1837.538220] ldm_validate_partition_table(): Disk read failed. [ 1837.551534] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.558024] Buffer I/O error on dev loop0, logical block 0, async page read [ 1837.590035] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1837.596504] Buffer I/O error on dev loop0, logical block 0, async page read [ 1837.608554] Dev loop0: unable to read RDB block 0 [ 1837.630053] loop0: unable to read partition table [ 1837.636017] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1837.739758] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 12:16:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) 12:16:26 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 12:16:26 executing program 3: socket$unix(0x1, 0x0, 0x0) io_setup(0x6, &(0x7f00000000c0)) 12:16:26 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 12:16:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) 12:16:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00', 0x10) sendto(r0, &(0x7f00000001c0)="96", 0x1, 0x0, 0x0, 0x0) 12:16:26 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 12:16:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) 12:16:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000008065101ff0080fffdffff2e0a0000000c000100060000007d0a00010c000200000022ff02f10000"], 0x2c}}, 0x0) 12:16:26 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) [ 1838.035507] ldm_validate_partition_table(): Disk read failed. [ 1838.094752] Dev loop0: unable to read RDB block 0 12:16:26 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) [ 1838.121094] loop0: unable to read partition table [ 1838.130109] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1838.157460] netlink: 'syz-executor3': attribute type 1 has an invalid length. 12:16:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) [ 1838.212185] netlink: 'syz-executor3': attribute type 1 has an invalid length. 12:16:27 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000008065101ff0080fffdffff2e0a0000000c000100060000007d0a00010c000200000022ff02f10000"], 0x2c}}, 0x0) [ 1838.277093] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 12:16:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) 12:16:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9}) [ 1838.370724] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 1838.389750] netlink: 'syz-executor3': attribute type 1 has an invalid length. 12:16:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) [ 1838.613377] ldm_validate_partition_table(): Disk read failed. [ 1838.625603] Dev loop0: unable to read RDB block 0 [ 1838.637456] loop0: unable to read partition table [ 1838.643688] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 12:16:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00', 0x10) sendto(r0, &(0x7f00000001c0)="96", 0x1, 0x0, 0x0, 0x0) 12:16:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000008065101ff0080fffdffff2e0a0000000c000100060000007d0a00010c000200000022ff02f10000"], 0x2c}}, 0x0) 12:16:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) 12:16:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) [ 1838.770256] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 1838.794659] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 1838.815324] netlink: 'syz-executor3': attribute type 1 has an invalid length. 12:16:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) 12:16:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) 12:16:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) 12:16:27 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000008065101ff0080fffdffff2e0a0000000c000100060000007d0a00010c000200000022ff02f10000"], 0x2c}}, 0x0) 12:16:27 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:27 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) [ 1839.039966] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 1839.077999] netlink: 'syz-executor3': attribute type 1 has an invalid length. 12:16:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@dstaddrv4={0x18}, @sndrcv={0x30}], 0x48}, 0x0) 12:16:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00', 0x10) sendto(r0, &(0x7f00000001c0)="96", 0x1, 0x0, 0x0, 0x0) 12:16:28 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:28 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:28 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1840.003089] IPVS: ftp: loaded support on port[0] = 21 12:16:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:29 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:29 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:29 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 12:16:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00', 0x10) sendto(r0, &(0x7f00000001c0)="96", 0x1, 0x0, 0x0, 0x0) 12:16:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1840.866108] IPVS: ftp: loaded support on port[0] = 21 12:16:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:32 executing program 1: r0 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setfsgid(r1) 12:16:32 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:32 executing program 1: r0 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setfsgid(r1) 12:16:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1843.531881] IPVS: ftp: loaded support on port[0] = 21 12:16:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 12:16:32 executing program 1: r0 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setfsgid(r1) 12:16:32 executing program 3: r0 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setfsgid(r1) 12:16:32 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:32 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:32 executing program 1: r0 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setfsgid(r1) 12:16:32 executing program 3: r0 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setfsgid(r1) [ 1844.231475] IPVS: ftp: loaded support on port[0] = 21 [ 1844.262278] IPVS: ftp: loaded support on port[0] = 21 12:16:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:33 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:33 executing program 3: r0 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setfsgid(r1) 12:16:33 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) [ 1845.082948] IPVS: ftp: loaded support on port[0] = 21 [ 1845.131064] IPVS: ftp: loaded support on port[0] = 21 [ 1845.148525] IPVS: ftp: loaded support on port[0] = 21 [ 1845.384560] IPVS: ftp: loaded support on port[0] = 21 12:16:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) [ 1852.347952] IPVS: ftp: loaded support on port[0] = 21 12:16:41 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) [ 1853.130768] IPVS: ftp: loaded support on port[0] = 21 [ 1853.173486] IPVS: ftp: loaded support on port[0] = 21 12:16:42 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) [ 1853.499494] IPVS: ftp: loaded support on port[0] = 21 12:16:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) [ 1853.977919] IPVS: ftp: loaded support on port[0] = 21 12:16:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) [ 1854.155618] IPVS: ftp: loaded support on port[0] = 21 [ 1854.666459] IPVS: ftp: loaded support on port[0] = 21 12:16:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) [ 1863.457899] IPVS: ftp: loaded support on port[0] = 21 12:16:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x2000000, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 12:16:52 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 12:16:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:16:52 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) [ 1863.925267] input: syz1 as /devices/virtual/input/input101 [ 1864.030015] input: syz1 as /devices/virtual/input/input102 [ 1864.118294] IPVS: ftp: loaded support on port[0] = 21 12:16:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x2000000, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 12:16:53 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 1864.512090] input: syz1 as /devices/virtual/input/input103 [ 1864.554260] IPVS: ftp: loaded support on port[0] = 21 12:16:53 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 1864.910367] input: syz1 as /devices/virtual/input/input104 [ 1873.136933] audit: type=1400 audit(1546863421.941:542): avc: denied { map } for pid=30076 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:17:03 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r3], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="03001a02008149ce9ad4c87b3a000000"], 0x1}}, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x94) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0//ile0\x00', r3}, 0xee7622f3e3dfea5d) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)) 12:17:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x2000000, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 12:17:03 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 12:17:03 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 12:17:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x2000000, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 12:17:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x102) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000d00)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae91, &(0x7f0000000480)={0x0, 0x2000}) dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:17:03 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 1874.926805] input: syz1 as /devices/virtual/input/input105 12:17:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/73}, 0x18) [ 1875.095834] IPVS: ftp: loaded support on port[0] = 21 12:17:04 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x2000000, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 12:17:04 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 12:17:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x2000000, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) [ 1875.354236] ptrace attach of "/root/syz-executor5"[27865] was attempted by "/root/syz-executor5"[30100] 12:17:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/73}, 0x18) 12:17:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/73}, 0x18) 12:17:04 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x2000000, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 12:17:04 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) [ 1875.985039] ptrace attach of "/root/syz-executor0"[23583] was attempted by "/root/syz-executor0"[30116] [ 1875.986785] ptrace attach of "/root/syz-executor5"[27865] was attempted by "/root/syz-executor5"[30120] 12:17:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/73}, 0x18) 12:17:04 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:04 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/73}, 0x18) 12:17:05 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/73}, 0x18) [ 1876.200359] ptrace attach of "/root/syz-executor2"[12743] was attempted by "/root/syz-executor2"[30127] 12:17:05 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) [ 1876.330148] ptrace attach of "/root/syz-executor5"[27865] was attempted by "/root/syz-executor5"[30133] [ 1876.350493] ptrace attach of "/root/syz-executor0"[23583] was attempted by "/root/syz-executor0"[30142] 12:17:05 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/73}, 0x18) 12:17:05 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) [ 1876.565707] ptrace attach of "/root/syz-executor2"[12743] was attempted by "/root/syz-executor2"[30148] [ 1876.573936] ptrace attach of "/root/syz-executor5"[27865] was attempted by "/root/syz-executor5"[30151] 12:17:05 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) [ 1876.763049] ptrace attach of "/root/syz-executor4"[19498] was attempted by "/root/syz-executor4"[30158] [ 1876.873957] ptrace attach of "/root/syz-executor5"[27865] was attempted by "/root/syz-executor5"[30169] 12:17:05 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="29eb5ee9f09c990f5cc76cacdb199ebe411ab9ef4e6ce521b9e5885d48101fbc640a2f07adf3543cd57a4e0600000000000000c476e173118b27c71b89ad2f048aed263b4dff3f7c34dd1563ec35757f03e06193d52647ee41528f60ca12774e243d7e3bf99ccc6d9acedbc866eda86c160172a12fda9e77e51960afc643be0f141b868181b862acd7aea5e4dbe5f5c9d6a4f605a8f32ea0c5538c748569ac7334d02ba1e95ef906455a56cf4a3275435c2539076da6107e75510f501065806a4abadb5c0ad21de1190ef456bfbcb733848b6cad618c1e6123b825d21ea2defd9d1dcc951746a275841507a308dfbbb3540b8ee12b24ace6dad3b7b972276be5eb6861b0b4388c3c0e4ad042f3b5122341e7c04a2327a9f25cce5ce00192c06eb1", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="29eb5ee9f09c990f5cc76cacdb199ebe411ab9ef4e6ce521b9e5885d48101fbc640a2f07adf3543cd57a4e0600000000000000c476e173118b27c71b89ad2f048aed263b4dff3f7c34dd1563ec35757f03e06193d52647ee41528f60ca12774e243d7e3bf99ccc6d9acedbc866eda86c160172a12fda9e77e51960afc643be0f141b868181b862acd7aea5e4dbe5f5c9d6a4f605a8f32ea0c5538c748569ac7334d02ba1e95ef906455a56cf4a3275435c2539076da6107e75510f501065806a4abadb5c0ad21de1190ef456bfbcb733848b6cad618c1e6123b825d21ea2defd9d1dcc951746a275841507a308dfbbb3540b8ee12b24ace6dad3b7b972276be5eb6861b0b4388c3c0e4ad042f3b5122341e7c04a2327a9f25cce5ce00192c06eb1", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:05 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x68, 0x0) 12:17:05 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:06 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="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", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 12:17:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0xff, 0x800, 0x3e5}) ioctl(r0, 0xffffffffffffffb8, &(0x7f0000000040)) 12:17:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x20005) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, '\x9e\xdez\x88Z\xe9^H\x00\x80\x00\x00\x00\x00\x00`O\x13\xee\xabe\xc029\x01\xdck\x00\x00\x00\x002\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\x00\x00t\xdb\xcf\xa6\xb7M\x00'}) write$FUSE_ATTR(r1, &(0x7f00000002c0)={0xf, 0x1}, 0x78) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0x3f}) 12:17:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 12:17:06 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x82, 0x410200) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x4) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000280)) write(r3, &(0x7f0000000340), 0x10000014c) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80003, 0xee9c) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f0000000240)={0x1}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="a59d2ca378941d3fdaf6b4a27e136684c10e1e29f10727da4169360a04d2069d750643ffffaba7450fce510fa8db549328f143f09b332c714ffcde0639e288ac536a13e9691d78b3cd43ec69da59b32fbc73a8e25b6943bb8b4fdf2e000000"]], 0x0, 0x0, 0x0}) 12:17:06 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 12:17:06 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/11, 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80001, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)={0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setresuid(0x0, r3, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x1f}, &(0x7f0000000800)=0x8) sendto$inet(r1, &(0x7f0000000540)="29eb5ee9f09c990f5cc76cacdb199ebe411ab9ef4e6ce521b9e5885d48101fbc640a2f07adf3543cd57a4e0600000000000000c476e173118b27c71b89ad2f048aed263b4dff3f7c34dd1563ec35757f03e06193d52647ee41528f60ca12774e243d7e3bf99ccc6d9acedbc866eda86c160172a12fda9e77e51960afc643be0f141b868181b862acd7aea5e4dbe5f5c9d6a4f605a8f32ea0c5538c748569ac7334d02ba1e95ef906455a56cf4a3275435c2539076da6107e75510f501065806a4abadb5c0ad21de1190ef456bfbcb733848b6cad618c1e6123b825d21ea2defd9d1dcc951746a275841507a308dfbbb3540b8ee12b24ace6dad3b7b972276be5eb6861b0b4388c3c0e4ad042f3b5122341e7c04a2327a9f25cce5ce00192c06eb1", 0x121, 0xfffffffffffffffa, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, 0x0, 0x40000) 03:33:20 executing program 1: socket(0x0, 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab07) 03:33:20 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 03:33:20 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 03:33:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:20 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:21 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 03:33:21 executing program 3: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 03:33:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:20 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 03:33:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:20 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000840)=[{&(0x7f0000000200)=""/252, 0xfc}], 0x1, 0x0) 03:33:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501c00, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x5, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, 0x0) 03:33:20 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 03:33:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x40d, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x500}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x7fffef48}}}, 0xb8}, 0x8}, 0x0) [ 1880.077231] IPVS: ftp: loaded support on port[0] = 21 [ 1880.306226] chnl_net:caif_netlink_parms(): no params data found [ 1880.356001] bridge0: port 1(bridge_slave_0) entered blocking state [ 1880.362970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1880.370589] device bridge_slave_0 entered promiscuous mode [ 1880.378382] bridge0: port 2(bridge_slave_1) entered blocking state [ 1880.385084] bridge0: port 2(bridge_slave_1) entered disabled state [ 1880.395196] device bridge_slave_1 entered promiscuous mode [ 1880.416355] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1880.426352] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1880.451655] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1880.459373] team0: Port device team_slave_0 added [ 1880.466589] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1880.474200] team0: Port device team_slave_1 added [ 1880.479708] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1880.487204] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1880.552328] device hsr_slave_0 entered promiscuous mode [ 1880.579310] device hsr_slave_1 entered promiscuous mode [ 1880.631068] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1880.638211] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1880.655691] bridge0: port 2(bridge_slave_1) entered blocking state [ 1880.662080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1880.668664] bridge0: port 1(bridge_slave_0) entered blocking state [ 1880.675069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1880.715277] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1880.721892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1880.731094] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1880.741513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1880.751383] bridge0: port 1(bridge_slave_0) entered disabled state [ 1880.758228] bridge0: port 2(bridge_slave_1) entered disabled state [ 1880.766060] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1880.776627] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1880.783850] 8021q: adding VLAN 0 to HW filter on device team0 [ 1880.794291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1880.802607] bridge0: port 1(bridge_slave_0) entered blocking state [ 1880.809034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1881.142891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1881.151107] bridge0: port 2(bridge_slave_1) entered blocking state [ 1881.157443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1881.179609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1881.350657] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1881.358040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1881.370498] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1881.377289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1881.386250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1881.550663] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1881.558775] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1881.570112] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1881.576170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1881.584349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1881.592749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1881.766111] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1881.778564] 8021q: adding VLAN 0 to HW filter on device batadv0 03:33:20 executing program 3: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 03:33:20 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) 03:33:20 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 03:33:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x40d, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x500}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x7fffef48}}}, 0xb8}, 0x8}, 0x0) 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 03:33:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 03:33:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa}, 0x1f3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000cc0), 0x0}, 0x18) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d00)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x0, 0x0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000400)="a4d77e2770e6dab6fdf289266b3f4cda0548c28455d82ec8a43e883b6618acd3b25f0fbf56e2a8769c49345b7ec8a066385f34ab748f19dce8292eb97ce4486073a1e195f56ba700ff15bf6f4bd4bf123052d750a025dadce0d9cc73028e50caa79268511c0be3d5747bf63ff0777031548c0ce65b6860e29565", 0x0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 03:33:20 executing program 0: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x40d, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x500}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x7fffef48}}}, 0xb8}, 0x8}, 0x0) 03:33:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 03:33:20 executing program 3: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}}, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 03:33:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x40d, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x500}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x7fffef48}}}, 0xb8}, 0x8}, 0x0) 03:33:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 03:33:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 03:33:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa}, 0x1f3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000cc0), 0x0}, 0x18) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d00)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x0, 0x0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000400)="a4d77e2770e6dab6fdf289266b3f4cda0548c28455d82ec8a43e883b6618acd3b25f0fbf56e2a8769c49345b7ec8a066385f34ab748f19dce8292eb97ce4486073a1e195f56ba700ff15bf6f4bd4bf123052d750a025dadce0d9cc73028e50caa79268511c0be3d5747bf63ff0777031548c0ce65b6860e29565", 0x0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 03:33:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 03:33:20 executing program 0: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 03:33:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa}, 0x1f3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000cc0), 0x0}, 0x18) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d00)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x0, 0x0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000400)="a4d77e2770e6dab6fdf289266b3f4cda0548c28455d82ec8a43e883b6618acd3b25f0fbf56e2a8769c49345b7ec8a066385f34ab748f19dce8292eb97ce4486073a1e195f56ba700ff15bf6f4bd4bf123052d750a025dadce0d9cc73028e50caa79268511c0be3d5747bf63ff0777031548c0ce65b6860e29565", 0x0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 03:33:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 03:33:20 executing program 1: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 03:33:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 03:33:20 executing program 1: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) [ 1883.360523] rpcbind: RPC call returned error 22 03:33:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa}, 0x1f3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000cc0), 0x0}, 0x18) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d00)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x0, 0x0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000400)="a4d77e2770e6dab6fdf289266b3f4cda0548c28455d82ec8a43e883b6618acd3b25f0fbf56e2a8769c49345b7ec8a066385f34ab748f19dce8292eb97ce4486073a1e195f56ba700ff15bf6f4bd4bf123052d750a025dadce0d9cc73028e50caa79268511c0be3d5747bf63ff0777031548c0ce65b6860e29565", 0x0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 03:33:21 executing program 2: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 03:33:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) [ 1883.572834] rpcbind: RPC call returned error 22 03:33:21 executing program 1: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) [ 1883.685176] rpcbind: RPC call returned error 22 03:33:21 executing program 4: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) [ 1883.865119] FS-Cache: Duplicate cookie detected [ 1883.872859] FS-Cache: O-cookie c=000000003ad56831 [p=00000000fabc9f00 fl=222 nc=0 na=1] [ 1883.881369] FS-Cache: O-cookie d=00000000d9d0fead n=0000000091d8135d [ 1883.888186] FS-Cache: O-key=[22] '02000a00000000000000040001000000000000000000' [ 1883.894375] rpcbind: RPC call returned error 22 [ 1883.896899] FS-Cache: N-cookie c=00000000c8d55486 [p=00000000fabc9f00 fl=2 nc=0 na=1] [ 1883.909756] FS-Cache: N-cookie d=00000000d9d0fead n=0000000028935764 [ 1883.916334] FS-Cache: N-key=[22] '02000a00000000000000040001000000000000000000' [ 1883.952218] rpcbind: RPC call returned error 22 03:33:21 executing program 0: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 03:33:21 executing program 2: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 03:33:21 executing program 1: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 03:33:21 executing program 5: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:21 executing program 4: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) [ 1884.251214] FS-Cache: Duplicate cookie detected [ 1884.256029] FS-Cache: O-cookie c=00000000680369b0 [p=00000000fabc9f00 fl=222 nc=0 na=1] [ 1884.264453] FS-Cache: O-cookie d=00000000d9d0fead n=0000000089d8eb68 [ 1884.271517] FS-Cache: O-key=[22] '02000a00000000000000040001000000000000000000' [ 1884.280572] FS-Cache: N-cookie c=000000006e037203 [p=00000000fabc9f00 fl=2 nc=0 na=1] [ 1884.288721] FS-Cache: N-cookie d=00000000d9d0fead n=0000000095600b1d [ 1884.295357] FS-Cache: N-key=[22] '02000a00000000000000040001000000000000000000' [ 1884.303710] FS-Cache: Duplicate cookie detected [ 1884.308800] FS-Cache: O-cookie c=00000000680369b0 [p=00000000fabc9f00 fl=222 nc=0 na=1] [ 1884.317504] FS-Cache: O-cookie d=00000000d9d0fead n=0000000089d8eb68 [ 1884.320781] rpcbind: RPC call returned error 22 [ 1884.324147] FS-Cache: O-key=[22] '02000a00000000000000040001000000000000000000' [ 1884.338210] FS-Cache: N-cookie c=0000000095a1957e [p=00000000fabc9f00 fl=2 nc=0 na=1] [ 1884.346304] FS-Cache: N-cookie d=00000000d9d0fead n=00000000ed438773 [ 1884.352908] FS-Cache: N-key=[22] '02000a00000000000000040001000000000000000000' [ 1884.411616] rpcbind: RPC call returned error 22 03:33:22 executing program 1: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) [ 1884.517988] rpcbind: RPC call returned error 22 03:33:22 executing program 3: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:22 executing program 4: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 03:33:22 executing program 2: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) syz_open_dev$vcsa(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x4, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xfd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) [ 1884.775359] rpcbind: RPC call returned error 22 03:33:22 executing program 4: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) [ 1884.837229] rpcbind: RPC call returned error 22 03:33:22 executing program 2: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:22 executing program 0: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:22 executing program 5: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:23 executing program 1: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:23 executing program 3: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) [ 1885.543636] device bridge_slave_1 left promiscuous mode [ 1885.551217] bridge0: port 2(bridge_slave_1) entered disabled state [ 1885.581809] device bridge_slave_0 left promiscuous mode [ 1885.588781] bridge0: port 1(bridge_slave_0) entered disabled state 03:33:23 executing program 4: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:23 executing program 2: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:23 executing program 5: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:23 executing program 0: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:23 executing program 1: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) [ 1891.221228] device hsr_slave_1 left promiscuous mode [ 1891.282745] device hsr_slave_0 left promiscuous mode [ 1891.344212] team0 (unregistering): Port device team_slave_1 removed [ 1891.356163] team0 (unregistering): Port device team_slave_0 removed [ 1891.372794] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1891.437035] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1891.517046] bond0 (unregistering): Released all slaves 03:33:29 executing program 3: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:29 executing program 0: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:29 executing program 2: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:29 executing program 4: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:29 executing program 5: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:29 executing program 1: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:30 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x2, 0x17, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_lifetime={0x4, 0x3}]}, 0x50}}, 0x0) 03:33:30 executing program 1: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:30 executing program 4: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:30 executing program 0: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x4000) 03:33:30 executing program 5: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x15, 0x0, &(0x7f0000003e80)) 03:33:30 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x2, 0x17, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_lifetime={0x4, 0x3}]}, 0x50}}, 0x0) 03:33:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x15, 0x0, &(0x7f0000003e80)) 03:33:30 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x2, 0x17, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_lifetime={0x4, 0x3}]}, 0x50}}, 0x0) 03:33:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x15, 0x0, &(0x7f0000003e80)) 03:33:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x15, 0x0, &(0x7f0000003e80)) 03:33:30 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x2, 0x17, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_lifetime={0x4, 0x3}]}, 0x50}}, 0x0) 03:33:31 executing program 1: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:31 executing program 4: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:31 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) msgget(0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x97, 0x7d, 0x2, {{0x0, 0x6d, 0xfffffffffffffffc, 0x7, {0x82, 0x0, 0x4}, 0x80000000, 0x7ff, 0xffff, 0x7fffffff, 0x15, '/dev/bus/usb/00#/00#\x00', 0x2, '\x94#', 0x15, '/dev/bus/usb/00#/00#\x00', 0xe, 'cgroupem1\xadeth0'}, 0x15, '/dev/bus/usb/00#/00#\x00', r2, r3}}, 0x97) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x16, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}}}, 0x7ff, 0x0, 0x0, 0x0, 0x2}, 0x98) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000040)={0x3, 0x0, 'client1\x00', 0x0, "e878acb56aa568a0", "d349fb37f146c1b7650e0671993b1f402556b1438d47a04cb919c990241ec0e5"}) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000140)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000180)=r4) ioprio_get$uid(0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5516}) 03:33:31 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@xino_auto='xino=auto'}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) 03:33:31 executing program 5: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000028c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000002900)='cpuacct.usage_sys\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002000)=""/171, 0xab}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/53, 0x35}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/133, 0x85}, {&(0x7f00000022c0)=""/235, 0xeb}], 0x6, &(0x7f0000002440)=""/73, 0x49, 0x6}, 0x40002000) recvmsg(r2, &(0x7f0000001e40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/154, 0x9a}, {&(0x7f0000001940)=""/154, 0x9a}, {&(0x7f0000001a00)=""/248, 0xf8}, {&(0x7f0000001b00)=""/221, 0xdd}, {&(0x7f0000000580)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/110, 0x6e}], 0x9, &(0x7f0000001d80)=""/191, 0xbf, 0x10001}, 0x2022) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={r4, r4, 0x3}, 0x10) recvmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/246, 0xf6}], 0x4, &(0x7f00000004c0)=""/83, 0x53, 0x3da}, 0x40000041) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000025c0)={&(0x7f00000029c0)='./file0\x00', r0}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bridge_slave_0\x00'}) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40af) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000002840)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x50, &(0x7f0000001e80)}, 0x10) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000002500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001f40)={r3}) recvmsg(r5, &(0x7f00000027c0)={0x0, 0xffffffffffffffeb, &(0x7f0000002780)=[{&(0x7f0000002600)=""/203, 0x37c}, {&(0x7f0000002700)=""/30, 0x1e}, {&(0x7f0000002740)=""/6, 0x6}], 0x3, 0x0, 0x4c, 0x1}, 0x142) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xffd0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r7, &(0x7f0000847f95), 0x0}, 0x18) 03:33:31 executing program 0: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 1893.694966] overlayfs: filesystem on './bus' not supported as upperdir 03:33:31 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) msgget(0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x97, 0x7d, 0x2, {{0x0, 0x6d, 0xfffffffffffffffc, 0x7, {0x82, 0x0, 0x4}, 0x80000000, 0x7ff, 0xffff, 0x7fffffff, 0x15, '/dev/bus/usb/00#/00#\x00', 0x2, '\x94#', 0x15, '/dev/bus/usb/00#/00#\x00', 0xe, 'cgroupem1\xadeth0'}, 0x15, '/dev/bus/usb/00#/00#\x00', r2, r3}}, 0x97) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x16, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}}}, 0x7ff, 0x0, 0x0, 0x0, 0x2}, 0x98) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000040)={0x3, 0x0, 'client1\x00', 0x0, "e878acb56aa568a0", "d349fb37f146c1b7650e0671993b1f402556b1438d47a04cb919c990241ec0e5"}) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000140)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000180)=r4) ioprio_get$uid(0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5516}) 03:33:31 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@xino_auto='xino=auto'}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) 03:33:31 executing program 0: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:31 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) msgget(0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x97, 0x7d, 0x2, {{0x0, 0x6d, 0xfffffffffffffffc, 0x7, {0x82, 0x0, 0x4}, 0x80000000, 0x7ff, 0xffff, 0x7fffffff, 0x15, '/dev/bus/usb/00#/00#\x00', 0x2, '\x94#', 0x15, '/dev/bus/usb/00#/00#\x00', 0xe, 'cgroupem1\xadeth0'}, 0x15, '/dev/bus/usb/00#/00#\x00', r2, r3}}, 0x97) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x16, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}}}, 0x7ff, 0x0, 0x0, 0x0, 0x2}, 0x98) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000040)={0x3, 0x0, 'client1\x00', 0x0, "e878acb56aa568a0", "d349fb37f146c1b7650e0671993b1f402556b1438d47a04cb919c990241ec0e5"}) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000140)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000180)=r4) ioprio_get$uid(0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5516}) 03:33:31 executing program 0: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:31 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) msgget(0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x97, 0x7d, 0x2, {{0x0, 0x6d, 0xfffffffffffffffc, 0x7, {0x82, 0x0, 0x4}, 0x80000000, 0x7ff, 0xffff, 0x7fffffff, 0x15, '/dev/bus/usb/00#/00#\x00', 0x2, '\x94#', 0x15, '/dev/bus/usb/00#/00#\x00', 0xe, 'cgroupem1\xadeth0'}, 0x15, '/dev/bus/usb/00#/00#\x00', r2, r3}}, 0x97) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x16, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}}}, 0x7ff, 0x0, 0x0, 0x0, 0x2}, 0x98) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000040)={0x3, 0x0, 'client1\x00', 0x0, "e878acb56aa568a0", "d349fb37f146c1b7650e0671993b1f402556b1438d47a04cb919c990241ec0e5"}) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000140)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000180)=r4) ioprio_get$uid(0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5516}) 03:33:32 executing program 2: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:32 executing program 4: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:32 executing program 0: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:32 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@xino_auto='xino=auto'}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) 03:33:32 executing program 1: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:32 executing program 5: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:32 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@xino_auto='xino=auto'}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) 03:33:32 executing program 0: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:32 executing program 1: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:33 executing program 0: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:33 executing program 1: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:33 executing program 2: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x202, 0x800000002009) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185502, 0x0) 03:33:33 executing program 4: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 03:33:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000200)="0adc1f023c123f3188a070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x60000000080ffff, [0x40000021], [0xc2]}) 03:33:33 executing program 5: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x202, 0x800000002009) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185502, 0x0) 03:33:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 03:33:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x202, 0x800000002009) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185502, 0x0) 03:33:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x202, 0x800000002009) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185502, 0x0) 03:33:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 03:33:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x202, 0x800000002009) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185502, 0x0) 03:33:34 executing program 2: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x202, 0x800000002009) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185502, 0x0) 03:33:34 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 03:33:34 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0xc0386106, &(0x7f00000000c0)) 03:33:34 executing program 5: getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = msgget$private(0x0, 0x40) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x102a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/130) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xfffffffffffffea3) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=r2}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r3, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:33:34 executing program 4: futex(&(0x7f00000001c0), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x25000000) 03:33:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x202, 0x800000002009) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185502, 0x0) 03:33:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:34 executing program 4: futex(&(0x7f00000001c0), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x25000000) 03:33:34 executing program 4: futex(&(0x7f00000001c0), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x25000000) 03:33:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:35 executing program 4: futex(&(0x7f00000001c0), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x25000000) 03:33:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1f, 0x9bbb, 0x0, 0x0, 0xffffffffffffff9c, 0x80000000}, 0x2c) socketpair(0x40000000000, 0x4, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2}, 0x0) 03:33:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:36 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:36 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x42801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000100)={0xa0}, 0xa0) ioctl$int_in(r0, 0x8000008004500b, 0x0) 03:33:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1f, 0x9bbb, 0x0, 0x0, 0xffffffffffffff9c, 0x80000000}, 0x2c) socketpair(0x40000000000, 0x4, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2}, 0x0) 03:33:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fedbdf25100000001400030008000500ac141400080008000000000004000200"], 0x1}}, 0x4000810) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'bond_slave_0\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) 03:33:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1f, 0x9bbb, 0x0, 0x0, 0xffffffffffffff9c, 0x80000000}, 0x2c) socketpair(0x40000000000, 0x4, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2}, 0x0) 03:33:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) [ 1901.326485] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6_vti0, syncid = 0, id = 0 03:33:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1f, 0x9bbb, 0x0, 0x0, 0xffffffffffffff9c, 0x80000000}, 0x2c) socketpair(0x40000000000, 0x4, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2}, 0x0) 03:33:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:39 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:39 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) [ 1902.161479] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6_vti0, syncid = 0, id = 0 03:33:39 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) [ 1906.565301] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6_vti0, syncid = 0, id = 0 03:33:44 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) [ 1907.239038] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6_vti0, syncid = 0, id = 0 03:33:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:45 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) [ 1909.280141] attempt to access beyond end of device [ 1909.285132] loop4: rw=1048577, want=765, limit=112 03:33:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:49 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:51 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:53 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) [ 1915.499144] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6_vti0, syncid = 0, id = 0 03:33:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) [ 1917.434965] attempt to access beyond end of device [ 1917.440110] loop2: rw=1048577, want=130, limit=112 [ 1917.445070] buffer_io_error: 326 callbacks suppressed [ 1917.445098] Buffer I/O error on dev loop2, logical block 129, lost async page write [ 1917.590217] attempt to access beyond end of device [ 1917.629899] loop2: rw=1048577, want=131, limit=112 [ 1917.670003] Buffer I/O error on dev loop2, logical block 130, lost async page write [ 1917.738423] attempt to access beyond end of device [ 1917.779028] loop2: rw=1048577, want=132, limit=112 [ 1917.809920] Buffer I/O error on dev loop2, logical block 131, lost async page write [ 1917.889496] attempt to access beyond end of device [ 1917.909065] loop2: rw=1048577, want=133, limit=112 [ 1917.914119] Buffer I/O error on dev loop2, logical block 132, lost async page write [ 1917.964760] attempt to access beyond end of device [ 1917.999162] loop2: rw=1048577, want=142, limit=112 [ 1918.004266] Buffer I/O error on dev loop2, logical block 141, lost async page write [ 1918.089315] attempt to access beyond end of device [ 1918.094284] loop2: rw=1048577, want=143, limit=112 [ 1918.199251] Buffer I/O error on dev loop2, logical block 142, lost async page write [ 1918.264998] attempt to access beyond end of device [ 1918.299372] loop2: rw=1048577, want=144, limit=112 [ 1918.330326] Buffer I/O error on dev loop2, logical block 143, lost async page write [ 1918.338181] attempt to access beyond end of device [ 1918.480223] loop2: rw=1048577, want=145, limit=112 [ 1918.525694] Buffer I/O error on dev loop2, logical block 144, lost async page write 03:33:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) [ 1918.621765] attempt to access beyond end of device [ 1918.653139] loop2: rw=1048577, want=461, limit=112 03:33:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) [ 1920.002721] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1920.078437] FAT-fs (loop2): Filesystem has been set read-only 03:33:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:33:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1f, 0x9bbb, 0x0, 0x0, 0xffffffffffffff9c, 0x80000000}, 0x2c) socketpair(0x40000000000, 0x4, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2}, 0x0) 03:33:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000006) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:33:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1f, 0x9bbb, 0x0, 0x0, 0xffffffffffffff9c, 0x80000000}, 0x2c) socketpair(0x40000000000, 0x4, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2}, 0x0) 03:34:00 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:34:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xfff}}, 0xf8}}, 0x0) 03:34:00 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000040000000000000000000000000000feffffff01000000450000000000000000006970366772653000000000000000000076657468315f746f5f627269646765007465616d5f736c6176655f3100000000697036677265300000000000000000000180c2000000000000000000ffffffffffff000000000000000070000000700000000600000000000700000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff000000001fa4c986cfd090e5ecec33d3c6099b57e09bba4b9ee35ebfd296d833aae22a7a8e004d4eb0d35b7281022a21d40381d09a298f406b86ccbe76bfc852c104b73a253126ac6e173592d34c3c4509305acdd67f87dbe806bd48589b2e3d5d7f429da332200db92e643cdeae91a7b6704b27c595ab9ee4ea6ca1a0964755519dec59d8a5b7b70b06aad23adfa95424f1c08866b4343417afce2535f5fadf12f1895dc657013e1ecf4c0d73d40cca8e402e7ef6cdeba86185dcc72e0c67b94bb662417f632b31005b44bd9a106c60dd471dbb24405b9d9688a775abdb0caa31bfbef956518163a0fa640356288668fbb22ff77c1ac41e8fcecea5b1d709cdfc41562eaa48f7731ac6743eded00122c2d1a962b2c4e86d636050d919c07ea001a3d8b713bc7d9e21a576e545e21afc1c848d01c4c02f785ab44b6bdb6c5d63cdea1f6552d4ca23"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:34:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1f, 0x9bbb, 0x0, 0x0, 0xffffffffffffff9c, 0x80000000}, 0x2c) socketpair(0x40000000000, 0x4, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2}, 0x0) 03:34:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xfff}}, 0xf8}}, 0x0) 03:34:01 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:34:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xfff}}, 0xf8}}, 0x0) 03:34:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) write$evdev(r0, &(0x7f0000000140)=[{}], 0xc9) 03:34:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xfff}}, 0xf8}}, 0x0) 03:34:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x2010000, 0x0) socketpair$unix(0x1, 0x20000000000003, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) flistxattr(r1, 0x0, 0x70b009942b333b5f) 03:34:03 executing program 5: futex(0x0, 0x1, 0x0, 0x0, 0x0, 0x0) 03:34:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) write$evdev(r0, &(0x7f0000000140)=[{}], 0xc9) 03:34:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) write$evdev(r0, &(0x7f0000000140)=[{}], 0xc9) 03:34:04 executing program 5: futex(0x0, 0x1, 0x0, 0x0, 0x0, 0x0) 03:34:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) write$evdev(r0, &(0x7f0000000140)=[{}], 0xc9) 03:34:04 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) fanotify_mark(0xffffffffffffffff, 0x12, 0x6000000, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 03:34:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x2010000, 0x0) socketpair$unix(0x1, 0x20000000000003, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) flistxattr(r1, 0x0, 0x70b009942b333b5f) 03:34:04 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x6) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x274, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000040), &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x2ec) perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffac, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x85, 0x0, 0x0, 0x7fa5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000009c0)={{0x368d, 0xee3a}, 'port0\x00', 0x2e, 0x180000, 0xffff, 0x2, 0xddb, 0x0, 0x8, 0x0, 0x4, 0xbee}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mlockall(0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000005c0)={0x4, 0x8000, 0x7, 0xce, 0x4a, 0x6}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000640)="69c107f78210d6054e09e1de1d5d1eb75496210a5e7ec9084b2b9aebbee8978447b238d8134650fc795b96d4742dfaba4719d5cfd1a5a8af76de260428bac6085aec24e3f2c8a6808b2eb868887a42dff787c88ebe560bd275c8b9e11186ad881d45f7a0a4f86f6864d1ff70cfe1c6c8e8bca98f6d95c91612be9b9d86178380c924a0762f62a6d447abcd398a24730a82859647d2286873c2017a77ff314e71d93cac8cc87254e7683aa68bd4868eb87329eeae9dbbfd94023145841ffa832b", 0xc0, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000700)="84114377f9a1436ebc61073bf8c25dcde881c028d42c9424df28fb0403362a35d5f7ef811179ac50c3734055582a577d2fccc6b63411d57eb29d93f5798ef39139f26f8ba612d3ed4213f2451deceff4865dcc81529dfa93900c1e9e40e7296a7d7a54a06fd9d13b667e115c46566399600958215bdff7da07fe79b68bafdc50f641ab4f1c67731040ee245ff4eab2e93dd4b99ca728601243a1acef56a8580ae6fbe3666b6aea43e8a45728a6310255c2730871a6b2", 0xb6, 0xfffffffffffffffd) keyctl$negate(0xd, r4, 0x805, r5) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000008c0)={0x50, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c40020000000164900000120000504db9b52162f2fbba537de07a7073c3a39292a81696c66a9101b11ed92b022080a0e015ef4539befefbb8a3cb7a1b2774aeac1d0514d064c8ac977630d7f101"], 0x9a, 0x0, &(0x7f0000000800)="f1088030ed263b31f463655890078b752bce7faa4cfeae7f734c9c5516c6b71bb7fe753408bf4a3fb319f49d93b8fbbd84f16bb1089fb68031505e2de392adc058e2f2d239c54e93cf5b5fb93db92686bd9f5cc8a955aa78a0464c4ac225c8fbc4984023426e7925353de719a8768bb383fb9fdad297127e039899137fa00d1e040d181732c045d52b573ac55baf598e65fd65424057c0b1d38f"}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000440)=0x6, 0x4) 03:34:04 executing program 5: futex(0x0, 0x1, 0x0, 0x0, 0x0, 0x0) 03:34:04 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x22}]}}}]}, 0x44}}, 0x0) 03:34:04 executing program 5: futex(0x0, 0x1, 0x0, 0x0, 0x0, 0x0) 03:34:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x2010000, 0x0) socketpair$unix(0x1, 0x20000000000003, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) flistxattr(r1, 0x0, 0x70b009942b333b5f) 03:34:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) fanotify_mark(0xffffffffffffffff, 0x12, 0x6000000, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 03:34:05 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:05 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x22}]}}}]}, 0x44}}, 0x0) 03:34:05 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 03:34:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x2010000, 0x0) socketpair$unix(0x1, 0x20000000000003, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) flistxattr(r1, 0x0, 0x70b009942b333b5f) [ 1927.635453] binder: 31029:31031 got transaction with invalid offset (0, min 0 max 0) or object. [ 1927.666890] binder: 31029:31031 transaction failed 29201/-22, size 0-8 line 3097 03:34:05 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x22}]}}}]}, 0x44}}, 0x0) 03:34:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) fanotify_mark(0xffffffffffffffff, 0x12, 0x6000000, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1927.702504] binder_alloc: binder_alloc_mmap_handler: 31029 20001000-20004000 already mapped failed -16 [ 1927.727585] binder: BINDER_SET_CONTEXT_MGR already set [ 1927.745978] binder_alloc: 31029: binder_alloc_buf, no vma [ 1927.800475] binder: 31029:31031 ioctl 40046207 0 returned -16 [ 1927.826187] binder: send failed reply for transaction 73 to 31029:31031 [ 1927.840098] binder: 31029:31038 transaction failed 29189/-3, size 0-0 line 3035 [ 1927.861247] binder: undelivered TRANSACTION_ERROR: 29189 [ 1927.881824] binder: undelivered TRANSACTION_COMPLETE [ 1927.893766] binder: undelivered TRANSACTION_ERROR: 29201 [ 1927.903286] binder: undelivered TRANSACTION_ERROR: 29189 03:34:07 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 03:34:07 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 03:34:07 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x22}]}}}]}, 0x44}}, 0x0) 03:34:07 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) fanotify_mark(0xffffffffffffffff, 0x12, 0x6000000, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 03:34:07 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:07 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 03:34:07 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) [ 1929.729414] binder: 31050:31057 got transaction with invalid offset (0, min 0 max 0) or object. 03:34:07 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 03:34:07 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:07 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) [ 1929.785907] binder: 31050:31057 transaction failed 29201/-22, size 0-8 line 3097 [ 1929.853640] binder: release 31050:31057 transaction 77 out, still active [ 1929.870430] binder: undelivered TRANSACTION_COMPLETE 03:34:07 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:07 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:07 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:07 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) [ 1929.895903] binder: undelivered TRANSACTION_ERROR: 29201 [ 1929.933511] binder: send failed reply for transaction 77, target dead 03:34:07 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 03:34:07 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:07 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) [ 1930.066817] binder: 31074:31080 got transaction with invalid offset (0, min 0 max 0) or object. 03:34:07 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:07 executing program 3: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2=0xe000000d}}, 0x1c) 03:34:07 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) dup2(r0, r1) [ 1930.110786] binder: 31074:31080 transaction failed 29201/-22, size 0-8 line 3097 03:34:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 03:34:07 executing program 0: syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000340), 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) [ 1930.196425] binder: release 31074:31080 transaction 80 out, still active [ 1930.219642] binder: undelivered TRANSACTION_COMPLETE [ 1930.240024] binder: undelivered TRANSACTION_ERROR: 29201 03:34:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 03:34:07 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000700)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0]}}], 0x0, 0x0, 0x0}) 03:34:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) dup2(r0, r1) [ 1930.320893] binder: send failed reply for transaction 80, target dead 03:34:08 executing program 3: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2=0xe000000d}}, 0x1c) 03:34:08 executing program 0: syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000340), 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) 03:34:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) dup2(r0, r1) 03:34:08 executing program 3: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2=0xe000000d}}, 0x1c) [ 1930.484008] binder: 31105:31112 got transaction with invalid offset (0, min 0 max 0) or object. [ 1930.510514] binder: 31105:31112 transaction failed 29201/-22, size 0-8 line 3097 [ 1930.582900] binder: release 31105:31112 transaction 83 out, still active [ 1930.617267] binder: undelivered TRANSACTION_COMPLETE 03:34:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000040)={&(0x7f0000006240)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x12}]]}}}]}, 0x3c}}, 0x0) 03:34:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) dup2(r0, r1) [ 1930.647553] binder: undelivered TRANSACTION_ERROR: 29201 [ 1930.667606] binder: send failed reply for transaction 83, target dead 03:34:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 03:34:08 executing program 3: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2=0xe000000d}}, 0x1c) 03:34:08 executing program 0: syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000340), 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) [ 1930.766067] netlink: 'syz-executor5': attribute type 18 has an invalid length. 03:34:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 03:34:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 03:34:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000040)={&(0x7f0000006240)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x12}]]}}}]}, 0x3c}}, 0x0) 03:34:08 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 03:34:08 executing program 0: syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000340), 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) 03:34:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 1931.241487] netlink: 'syz-executor5': attribute type 18 has an invalid length. 03:34:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 03:34:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000040)={&(0x7f0000006240)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x12}]]}}}]}, 0x3c}}, 0x0) 03:34:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 03:34:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 1931.524857] loop3: p1 p2 p3 p4 < > [ 1931.526688] netlink: 'syz-executor5': attribute type 18 has an invalid length. 03:34:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000040)={&(0x7f0000006240)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x12}]]}}}]}, 0x3c}}, 0x0) 03:34:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) [ 1931.774101] netlink: 'syz-executor5': attribute type 18 has an invalid length. [ 1931.900148] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1931.986461] print_req_error: 327 callbacks suppressed [ 1931.986474] print_req_error: I/O error, dev loop3, sector 201 flags 80700 [ 1932.025984] print_req_error: I/O error, dev loop3, sector 301 flags 80700 [ 1932.026461] print_req_error: I/O error, dev loop3, sector 201 flags 0 [ 1932.039102] print_req_error: I/O error, dev loop3, sector 1 flags 80700 [ 1932.040127] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1932.053989] print_req_error: I/O error, dev loop3, sector 1 flags 0 [ 1932.059566] print_req_error: I/O error, dev loop3, sector 5 flags 0 [ 1932.060498] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1932.066938] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 1932.074497] print_req_error: I/O error, dev loop3, sector 101 flags 80700 [ 1932.083595] print_req_error: I/O error, dev loop3, sector 205 flags 0 [ 1932.088515] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 1932.095130] Buffer I/O error on dev loop3p3, logical block 1, async page read [ 1932.102898] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 1932.117635] print_req_error: I/O error, dev loop3, sector 1 flags 0 [ 1932.124322] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1932.131713] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 1932.139222] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 1932.146522] Buffer I/O error on dev loop3p2, logical block 1, async page read [ 1932.153911] Buffer I/O error on dev loop3p3, logical block 0, async page read 03:34:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 03:34:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 03:34:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 03:34:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 03:34:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) [ 1932.380654] loop5: p1 p2 p3 p4 < > 03:34:10 executing program 4: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) [ 1932.553681] loop3: p1 p2 p3 p4 < > 03:34:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 03:34:10 executing program 4: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) [ 1932.592688] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:34:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 1932.807980] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 03:34:10 executing program 4: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 03:34:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 1932.974299] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 03:34:10 executing program 4: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 03:34:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) [ 1933.199345] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:34:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 03:34:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) r0 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) sysinfo(&(0x7f0000000840)=""/94) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) listen(r0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 1933.402513] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 03:34:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000b80)=""/72, 0x48}], 0x1}}, {{&(0x7f0000000e80)=@ipx, 0x80, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000f40)=""/94, 0x5e}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/220, 0xdc}], 0x4, &(0x7f0000001140)=""/195, 0xc3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 03:34:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1933.722919] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 03:34:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1933.918170] loop5: p1 p2 p3 p4 < > 03:34:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1934.160114] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:34:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:34:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:34:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x64, 0x0, 0x0, 0xfffff03c}]}, 0x10) 03:34:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffdea) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0x2000000000a, 0x0) mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:34:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x64, 0x0, 0x0, 0xfffff03c}]}, 0x10) 03:34:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x64, 0x0, 0x0, 0xfffff03c}]}, 0x10) 03:34:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:34:13 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="489a"], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x64, 0x0, 0x0, 0xfffff03c}]}, 0x10) 03:34:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:13 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="489a"], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="489a"], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:34:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="489a"], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:17 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) [ 1940.081894] attempt to access beyond end of device [ 1940.086881] loop4: rw=1048577, want=2517, limit=112 03:34:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffe49) preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) mlockall(0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:19 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x200}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r3 = accept$alg(r1, 0x0, 0x0) io_setup(0x200001, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x88000000, 'lblcr\x00'}, 0x2c) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="62747266732e73656c696e7578272a65c2653af4560120d13b55b5db7573657200"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) sendmmsg(r7, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 03:34:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:25 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x420b, r0, 0x0, 0x0) 03:34:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:26 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x420b, r0, 0x0, 0x0) 03:34:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x800000000105082) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x102000000) 03:34:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:26 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x140, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 03:34:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x800000000105082) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x102000000) 03:34:26 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x140, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 03:34:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x800000000105082) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x102000000) 03:34:27 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x420b, r0, 0x0, 0x0) 03:34:27 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x140, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 03:34:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x800000000105082) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x102000000) 03:34:27 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x140, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 03:34:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x800000000105082) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x102000000) [ 1950.229332] attempt to access beyond end of device [ 1950.240073] loop2: rw=1, want=549, limit=112 03:34:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/230, 0xe6, 0x2000, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x2633f4ec) keyctl$set_reqkey_keyring(0x2, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) r3 = socket(0x10, 0x2, 0xc) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000001c0)='\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x0, 0xe3c, 0x0, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r5, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="7fdb35caa6e48d8a4ea3462d1017b134963f6fa9b5adb5f30623aec1fc99b9a43f5abe35fcf0cb2f109fea642fca6d90beda7567ebdccfcd00a7b975b6689f8bffa162744f39dd351fc15c0121c1ee881632921da28a2f2dc38aec9f3eea75b0d1c1"], 0x62) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x0, 0x0, 0x0, r10}, {0x8, 0x7bfb, 0x9, 0x0, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x0, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev, 0x4d5, 0x32}, 0xa, @in6=@dev, 0x3506, 0x7, 0x3, 0xe, 0x458}}, 0xe8) write(r8, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r3, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000200000010d102f7ce", 0x1f) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0), 0x4) 03:34:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x800000000105082) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x102000000) 03:34:28 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)) 03:34:28 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x420b, r0, 0x0, 0x0) 03:34:28 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)) 03:34:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x800000000105082) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x102000000) 03:34:28 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)) 03:34:28 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)) 03:34:28 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)) 03:34:29 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)) 03:34:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:29 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)) 03:34:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:29 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:29 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000080)=@ipx={0x4, 0x0, 0x10000, "53182b934496"}, 0x80) 03:34:29 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 03:34:29 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:29 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000080)=@ipx={0x4, 0x0, 0x10000, "53182b934496"}, 0x80) 03:34:29 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:30 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000080)=@ipx={0x4, 0x0, 0x10000, "53182b934496"}, 0x80) 03:34:30 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:30 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000080)=@ipx={0x4, 0x0, 0x10000, "53182b934496"}, 0x80) 03:34:30 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:30 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:31 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 03:34:31 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:31 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x402, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @empty, 0xde}, @in6={0xa, 0x4e24, 0xd, @empty, 0x612}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0x80}, @in6={0xa, 0x4e22, 0x0, @empty, 0x2}], 0x70) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2c0000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000, 0x7439010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:34:31 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:31 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00003b2000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:34:31 executing program 4: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 03:34:31 executing program 5: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 03:34:32 executing program 3: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 03:34:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 03:34:33 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 03:34:33 executing program 2: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'veth1_to_bond\x00'}, 0x18) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) inotify_init1(0x0) 03:34:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@empty, @empty}, 0xc) 03:34:33 executing program 2: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'veth1_to_bond\x00'}, 0x18) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) inotify_init1(0x0) 03:34:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@empty, @empty}, 0xc) 03:34:33 executing program 4: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 03:34:33 executing program 2: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'veth1_to_bond\x00'}, 0x18) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) inotify_init1(0x0) 03:34:33 executing program 5: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 03:34:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@empty, @empty}, 0xc) 03:34:33 executing program 2: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'veth1_to_bond\x00'}, 0x18) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) inotify_init1(0x0) 03:34:34 executing program 3: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 03:34:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@empty, @empty}, 0xc) [ 1957.064207] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: rcu_dynticks_curr_cpu_in_eqs+0x169/0x170 [ 1957.075876] CPU: 0 PID: 31746 Comm: syz-executor0 Not tainted 5.0.0-rc1+ #14 [ 1957.083071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1957.092427] Call Trace: [ 1957.096028] Kernel Offset: disabled [ 1957.099667] Rebooting in 86400 seconds..