eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:49 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:49 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x140000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:49 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfffffffd, @tick, {}, {}, @quote}], 0xff33) [ 835.387493][ C0] net_ratelimit: 16 callbacks suppressed [ 835.387517][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 835.399940][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 835.406909][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 835.413406][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 835.467121][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 835.472988][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:17:49 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:49 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 835.707085][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 835.712918][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:17:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x0, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:49 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:50 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x234e00, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:50 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:50 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 836.108100][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 836.114716][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:17:50 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:50 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfffffffe, @tick, {}, {}, @quote}], 0xff33) 18:17:50 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x0, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:51 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x4e2300, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:51 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:51 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x0, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:51 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x4000000000000, @tick, {}, {}, @quote}], 0xff33) 18:17:51 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x1000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:51 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:52 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:52 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x2000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:52 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:52 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:52 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:52 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x0, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:52 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x3000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:52 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x14000000000000, @tick, {}, {}, @quote}], 0xff33) 18:17:52 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:53 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:53 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:53 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:53 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x0, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:54 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x4000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:54 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x4e230000000000, @tick, {}, {}, @quote}], 0xff33) 18:17:54 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:54 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x0, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 840.507542][ C1] net_ratelimit: 24 callbacks suppressed [ 840.507611][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 840.519787][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:17:54 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x5000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:54 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:54 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:55 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:55 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x100000000000000, @tick, {}, {}, @quote}], 0xff33) 18:17:55 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x8000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:55 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x0, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:55 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 841.627307][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 841.633638][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 841.640796][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 841.647306][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 841.707079][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 841.712921][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:17:56 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 841.947090][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 841.952923][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:17:56 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:56 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x9000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:56 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x200000000000000, @tick, {}, {}, @quote}], 0xff33) 18:17:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x0, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:56 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:57 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:57 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:57 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xa000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x0, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:57 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 18:17:57 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x300000000000000, @tick, {}, {}, @quote}], 0xff33) 18:17:57 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 18:17:57 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xb000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:58 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 18:17:58 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x0, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:58 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:58 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xc000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:58 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:58 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400000000000000, @tick, {}, {}, @quote}], 0xff33) 18:17:58 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x80ffffff, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:58 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:17:59 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x0, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:59 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:59 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:17:59 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x81000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:17:59 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500000000000000, @tick, {}, {}, @quote}], 0xff33) 18:17:59 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 845.787078][ C0] net_ratelimit: 14 callbacks suppressed [ 845.787094][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 845.798824][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 845.804762][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 845.810675][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:18:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x0, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 845.867106][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 845.872957][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 846.107106][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 846.112961][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:00 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:00 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 846.507075][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 846.512896][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:00 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x81ffffff, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:00 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x600000000000000, @tick, {}, {}, @quote}], 0xff33) 18:18:00 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x0, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:01 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x92ffffff, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:01 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:01 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:01 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x800000000000000, @tick, {}, {}, @quote}], 0xff33) 18:18:01 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x93ffffff, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:01 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x0, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:02 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:02 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x94000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:02 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:02 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x94ffffff, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x0, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:02 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x80ffffff00000000, @tick, {}, {}, @quote}], 0xff33) 18:18:02 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:02 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:03 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xbf000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:03 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x81ffffff00000000, @tick, {}, {}, @quote}], 0xff33) 18:18:03 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x0, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:03 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:03 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 18:18:04 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:04 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xfd000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:04 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x9200000000000000, @tick, {}, {}, @quote}], 0xff33) 18:18:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0x0, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:04 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 18:18:04 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 18:18:04 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:05 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xfdffffff, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 850.907083][ C1] net_ratelimit: 24 callbacks suppressed [ 850.907091][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 850.912839][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0x0, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:05 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 18:18:05 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x92ffffff00000000, @tick, {}, {}, @quote}], 0xff33) 18:18:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0x0, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:05 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 18:18:06 executing program 2: pipe(&(0x7f0000000000)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:06 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 852.044093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 852.050019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 852.055923][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 852.061838][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 852.107772][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 852.114120][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:06 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 18:18:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:06 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:06 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x9300000000000000, @tick, {}, {}, @quote}], 0xff33) 18:18:06 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xff000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 852.747069][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 852.752915][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:06 executing program 2: pipe(&(0x7f0000000000)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:07 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, 0x0}, 0x0) 18:18:07 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xff030000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:07 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:07 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, 0x0}, 0x0) 18:18:07 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x93ffffff00000000, @tick, {}, {}, @quote}], 0xff33) 18:18:07 executing program 2: pipe(&(0x7f0000000000)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:18:07 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, 0x0}, 0x0) 18:18:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:08 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) socket$inet_udplite(0x2, 0x2, 0x88) r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = open(0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) lseek(r2, 0x0, 0x3) 18:18:08 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f0000000440)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "8e519901d693e390c2849abe6b14901a84289395a7196030fff7de511ccc5ca7c28e06a93d17547dca88fcb8a976ea0a02af6313836d11f153dbdce844c037d1e369823e4f636d2df139a6c59c22a869e8bd3f509f64fece575ec56bc4c27ff2332b4bacd980500a913659920c86fb44a56bf19040878c6032ceccdc6203ee0d36ee53aefe79e66741"}, 0xe1) r2 = syz_open_dev$admmidi(0x0, 0x0, 0x800) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, &(0x7f0000000400)) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 18:18:08 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:08 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xffffff80, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:08 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x9400000000000000, @tick, {}, {}, @quote}], 0xff33) 18:18:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) getsockopt$inet_int(r1, 0x0, 0xe, 0x0, &(0x7f0000000040)) 18:18:09 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xffffff81, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') lseek(r0, 0xffffffe000000000, 0x3) 18:18:09 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:09 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x94ffffff00000000, @tick, {}, {}, @quote}], 0xff33) 18:18:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 18:18:09 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xffffff92, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 855.920226][T27011] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:18:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:10 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bc070") poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x240}], 0x1, 0x6f8bf6d3) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x1f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x1000000010005, 0x0) [ 856.187065][ C0] net_ratelimit: 12 callbacks suppressed [ 856.187078][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 856.198842][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 856.204766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 856.210668][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 856.267069][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 856.272938][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:10 executing program 4: timer_create(0x0, 0x0, &(0x7f0000fd7000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) timer_getoverrun(0x0) [ 856.507078][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 856.512968][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:10 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:10 executing program 4: 18:18:10 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xbf00000000000000, @tick, {}, {}, @quote}], 0xff33) 18:18:11 executing program 4: 18:18:11 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xffffff93, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 856.908087][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 856.914579][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:11 executing program 4: 18:18:11 executing program 4: 18:18:11 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 18:18:11 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:11 executing program 4: r0 = semget$private(0x0, 0x8, 0x0) semop(0x0, 0x0, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0xffffffff}], 0x1) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 18:18:11 executing program 2: pipe(0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:12 executing program 4: 18:18:12 executing program 4: 18:18:12 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfdffffff00000000, @tick, {}, {}, @quote}], 0xff33) 18:18:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:12 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xffffff94, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:12 executing program 4: 18:18:12 executing program 4: 18:18:12 executing program 4: 18:18:12 executing program 2: pipe(0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:12 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:12 executing program 4: 18:18:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:13 executing program 4: 18:18:13 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfeffffff00000000, @tick, {}, {}, @quote}], 0xff33) 18:18:13 executing program 4: 18:18:13 executing program 4: 18:18:13 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xfffffffd, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:13 executing program 4: 18:18:13 executing program 4: 18:18:13 executing program 2: pipe(0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:13 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:13 executing program 4: 18:18:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:14 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xfffffffe, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:14 executing program 4: 18:18:14 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xff00000000000000, @tick, {}, {}, @quote}], 0xff33) 18:18:14 executing program 4: 18:18:14 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x4000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:14 executing program 4: 18:18:14 executing program 4: 18:18:14 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:14 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:14 executing program 4: 18:18:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:15 executing program 4: 18:18:15 executing program 4: 18:18:15 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x14000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 861.307081][ C1] net_ratelimit: 20 callbacks suppressed [ 861.307088][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 861.318780][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:15 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xff03000000000000, @tick, {}, {}, @quote}], 0xff33) 18:18:15 executing program 4: 18:18:15 executing program 4: 18:18:15 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 18:18:15 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:15 executing program 4: 18:18:15 executing program 4: 18:18:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:16 executing program 4: 18:18:16 executing program 4: 18:18:16 executing program 4: [ 862.427063][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 862.432999][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 862.438871][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 862.444629][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:18:16 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x4e230000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 862.507969][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 862.514437][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:16 executing program 4: 18:18:16 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xffffffff00000000, @tick, {}, {}, @quote}], 0xff33) 18:18:16 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:16 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 18:18:16 executing program 4: 18:18:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:17 executing program 4: 18:18:17 executing program 4: 18:18:17 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x100000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 863.147458][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 863.153932][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x2, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 18:18:17 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:17 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:18 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 18:18:18 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x200000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:18 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x300000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = memfd_create(&(0x7f0000000140)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x2) ftruncate(r1, 0x40001) sendfile(r0, r1, 0x0, 0x100000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x8) 18:18:20 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:20 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:20 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, 0x0}, 0x0) 18:18:20 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x400000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 866.587584][ C0] net_ratelimit: 10 callbacks suppressed [ 866.587625][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 866.599998][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 866.607399][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 866.613862][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 866.667376][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 866.673393][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:20 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x500000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = memfd_create(&(0x7f0000000140)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x2) ftruncate(r1, 0x40001) sendfile(r0, r1, 0x0, 0x100000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x8) 18:18:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 866.907082][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 866.912891][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:21 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:21 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:21 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, 0x0}, 0x0) 18:18:21 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040), 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:21 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:21 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x800000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040), 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:21 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 867.547113][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 867.552983][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:21 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:21 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040), 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:21 executing program 4: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:22 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:22 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x900000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:22 executing program 4: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:22 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, 0x0}, 0x0) 18:18:22 executing program 4: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:22 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:22 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xa00000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:22 executing program 4: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:23 executing program 4: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:23 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) msgget(0xffffffffffffffff, 0x80) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) sigaltstack(&(0x7f0000b7c000/0x2000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sigaltstack(&(0x7f0000ffc000/0x1000)=nil, 0x0) sendfile(r0, r1, 0x0, 0x80000001) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 18:18:23 executing program 4: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:23 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:23 executing program 4: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:23 executing program 4: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:23 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:23 executing program 4: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:23 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:18:23 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xb00000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:24 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, 0x0) 18:18:24 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfeffffff00000000, @tick, {}, {}, @quote}], 0xff33) 18:18:24 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, 0x0) 18:18:24 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xc00000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:24 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:24 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, 0x0) 18:18:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:24 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0x0, 0x0}) 18:18:25 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:25 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0x0, 0x0}) 18:18:25 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0x0, 0x0}) 18:18:25 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:25 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:25 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', 0x0) 18:18:25 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x80ffffff00000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:25 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 871.707062][ C1] net_ratelimit: 20 callbacks suppressed [ 871.707071][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 871.718625][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:26 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x8100000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:26 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', 0x0) 18:18:26 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x81ffffff00000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:26 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:26 executing program 1: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:26 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 872.827638][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 872.834111][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 872.841231][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 872.847681][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 872.907678][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 872.914037][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:27 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x92ffffff00000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 873.147071][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 873.152903][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:27 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', 0x0) 18:18:27 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0x0, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:28 executing program 4: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:28 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xbf000000, @tick, {}, {}, @quote}], 0xff33) 18:18:28 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x93ffffff00000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:28 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:28 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0x0, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:29 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xbf000000, @tick, {}, {}, @quote}], 0xff33) 18:18:29 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:29 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) dup3(r1, r0, 0x80000) r2 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r2, &(0x7f0000000080), 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 18:18:29 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x9400000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:30 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0x0, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:30 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xbf000000, @tick, {}, {}, @quote}], 0xff33) 18:18:30 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:30 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x94ffffff00000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:30 executing program 4: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x0, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x0, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x0, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x0, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0xfffffffffffffff7, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x3, 0x7, 0x0, 0x1, 0x440], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:31 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:31 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) dup3(r1, r0, 0x80000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r2, &(0x7f0000000080), 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:31 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xbf00000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:31 executing program 5 (fault-call:10 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:31 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 877.707063][ C1] net_ratelimit: 16 callbacks suppressed [ 877.707072][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 877.718599][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:31 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:32 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 877.947083][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 877.953056][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:32 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xfd00000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:32 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x2, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:32 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5421, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 878.565777][T27808] FAULT_INJECTION: forcing a failure. [ 878.565777][T27808] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 878.579189][T27808] CPU: 0 PID: 27808 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190226 #43 [ 878.588298][T27808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.598362][T27808] Call Trace: [ 878.601671][T27808] dump_stack+0x172/0x1f0 [ 878.606016][T27808] should_fail.cold+0xa/0x15 [ 878.610620][T27808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 878.616519][T27808] ? is_bpf_text_address+0xac/0x170 [ 878.621735][T27808] should_fail_alloc_page+0x50/0x60 [ 878.626939][T27808] __alloc_pages_nodemask+0x1a1/0x7e0 [ 878.632321][T27808] ? find_held_lock+0x35/0x130 [ 878.637096][T27808] ? __alloc_pages_slowpath+0x2900/0x2900 [ 878.642837][T27808] ? lock_downgrade+0x880/0x880 [ 878.647695][T27808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 878.653943][T27808] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 878.660196][T27808] alloc_pages_current+0x107/0x210 [ 878.665325][T27808] __get_free_pages+0xc/0x40 [ 878.669919][T27808] __tlb_remove_page_size+0x2ee/0x510 [ 878.675300][T27808] unmap_page_range+0xedf/0x2330 [ 878.680262][T27808] ? vm_normal_page_pmd+0x400/0x400 [ 878.685470][T27808] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 878.691719][T27808] ? uprobe_munmap+0xad/0x2b0 [ 878.696406][T27808] ? __kasan_slab_free+0x102/0x150 [ 878.701527][T27808] unmap_single_vma+0x19d/0x300 [ 878.706392][T27808] unmap_vmas+0x115/0x250 [ 878.710729][T27808] ? zap_vma_ptes+0x110/0x110 [ 878.715418][T27808] ? kasan_check_write+0x14/0x20 [ 878.720357][T27808] ? kasan_check_write+0x14/0x20 [ 878.720378][T27808] exit_mmap+0x2c2/0x530 [ 878.720395][T27808] ? __ia32_sys_munmap+0x80/0x80 [ 878.720412][T27808] ? __sanitizer_cov_trace_const_cmp1+0x19/0x20 [ 878.720434][T27808] ? rcu_read_lock_sched_held+0x110/0x130 [ 878.729584][T27808] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 878.729600][T27808] ? __khugepaged_exit+0xcf/0x400 [ 878.729617][T27808] mmput+0x15f/0x4c0 [ 878.729631][T27808] do_exit+0x816/0x2fa0 18:18:32 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:32 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5450, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 878.729645][T27808] ? find_held_lock+0x35/0x130 [ 878.729663][T27808] ? get_signal+0x331/0x1d50 [ 878.729678][T27808] ? mm_update_next_owner+0x640/0x640 [ 878.729694][T27808] ? kasan_check_write+0x14/0x20 [ 878.729711][T27808] ? _raw_spin_unlock_irq+0x28/0x90 [ 878.729723][T27808] ? get_signal+0x331/0x1d50 [ 878.729734][T27808] ? _raw_spin_unlock_irq+0x28/0x90 [ 878.729751][T27808] do_group_exit+0x135/0x370 [ 878.780561][T27808] get_signal+0x399/0x1d50 [ 878.780592][T27808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 878.780608][T27808] ? fsnotify+0x811/0xbc0 [ 878.780630][T27808] do_signal+0x87/0x1940 [ 878.790744][T27808] ? kick_process+0xef/0x180 [ 878.790761][T27808] ? task_work_add+0x9c/0x110 [ 878.790786][T27808] ? setup_sigcontext+0x7d0/0x7d0 [ 878.790818][T27808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 878.790838][T27808] ? fput_many+0x12c/0x1a0 [ 878.790858][T27808] ? ksys_write+0x166/0x1f0 [ 878.790876][T27808] ? exit_to_usermode_loop+0x43/0x2c0 [ 878.790895][T27808] ? do_syscall_64+0x52d/0x610 18:18:33 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xfdffffff00000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 878.790908][T27808] ? exit_to_usermode_loop+0x43/0x2c0 [ 878.790930][T27808] ? lockdep_hardirqs_on+0x418/0x5d0 [ 878.874729][T27808] ? trace_hardirqs_on+0x67/0x230 [ 878.879776][T27808] exit_to_usermode_loop+0x244/0x2c0 [ 878.885081][T27808] do_syscall_64+0x52d/0x610 [ 878.889688][T27808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 878.895589][T27808] RIP: 0033:0x457e29 [ 878.899495][T27808] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 878.919097][T27808] RSP: 002b:00007f7e53412c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 878.927508][T27808] RAX: 000000000000ff30 RBX: 00007f7e53412c90 RCX: 0000000000457e29 [ 878.927517][T27808] RDX: 000000000000ff33 RSI: 0000000020000040 RDI: 0000000000000005 [ 878.927524][T27808] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 878.927531][T27808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e534136d4 [ 878.927539][T27808] R13: 00000000004c73d7 R14: 00000000004dcfe0 R15: 0000000000000006 18:18:33 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) dup3(r1, r0, 0x80000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r2, &(0x7f0000000080), 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:33 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5451, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 879.067076][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 879.072883][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 879.078872][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 879.084633][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:18:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:33 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:33 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5452, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 879.147068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 879.152944][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:33 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5460, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:33 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xfeffffff00000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:33 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x40049409, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:33 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:33 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x4020940d, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:34 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0045878, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x2, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:34 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) dup3(r1, r0, 0x80000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r2, &(0x7f0000000080), 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:34 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:34 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0045878, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:34 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xff00000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:34 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:34 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0189436, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:35 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc020660b, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:35 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfdfdffff, &(0x7f0000000040)}) [ 881.199833][T27939] ion_ioctl: ioctl validate failed 18:18:35 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x3, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:35 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xff03000000000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:35 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfdfdffff00000000, &(0x7f0000000040)}) 18:18:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:36 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:36 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040), 0xfdfdffff}) 18:18:36 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:36 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0xffffffff00000000, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:36 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040), 0xfffffdfd}) 18:18:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:36 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040), 0xfdfdffff00000000}) 18:18:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x4, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:36 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040), 0x0, 0xfdfdffff}) 18:18:36 executing program 1: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:36 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x2, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:37 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:37 executing program 1: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:37 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:37 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040), 0x0, 0xfffffdfd}) 18:18:37 executing program 1: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:37 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040), 0x0, 0xfdfdffff00000000}) 18:18:37 executing program 1: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) [ 883.237682][ C0] net_ratelimit: 16 callbacks suppressed [ 883.237695][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 883.250053][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 883.257171][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 883.263782][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:18:37 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x202000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x5, 0x3, 0x4}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={r2, 0x4, 0x8000}, 0x8) [ 883.307069][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 883.312891][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 883.547090][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 883.552960][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:37 executing program 1: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:37 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000081000000050000000000000009000000000000001d060000000000004000000000000000000000000000000000000000000000000000000000000000ff0300000000010909000000000000000100000000000000030000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) 18:18:37 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:38 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:38 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000140)={0x34, 0x0, &(0x7f0000000180)}) pwrite64(r0, &(0x7f00000000c0)="a1a4b893a4e57a7d41207c1453adbadd873d7a87a6fe8edb5015801f43928b8118dc12808008e5119c87eec4b5052bd027c399dc8eedefb4a9e8295101117d347b139d5587334926c046", 0x4a, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x4400) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) 18:18:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:38 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:38 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:38 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x4, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:38 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100), &(0x7f0000000180)=0x4) getsockname$packet(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x14) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x2d0, 0x0, &(0x7f0000000140)}) [ 884.187062][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 884.192926][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:38 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x8, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:38 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x54002, 0x0) ioctl$CAPI_INSTALLED(r1, 0x80024322) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xc1bdf005256e2899, 0x0, &(0x7f0000000040)}) 18:18:38 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0xfffffdfd, &(0x7f0000000040)}) 18:18:39 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x208000, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000000c0)) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:39 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:39 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, 0x0) 18:18:39 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000000c0)={0x7fffffff, 0x1, 0x1, 0x3, 0x7fffffff, 0x5}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:39 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, 0x0) 18:18:39 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x5, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:39 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x0) getsockopt$netlink(r1, 0x10e, 0x2, &(0x7f00000000c0)=""/104, &(0x7f0000000140)=0x68) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:39 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, 0x0) 18:18:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x9, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:40 executing program 4: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) 18:18:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000034000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="f2da77000f22140f20e06635000002000f22e0260f4dee0f01c8baf80c66b888b7008f66efbafc0cb83535ef82240ef20f08660f3a61dd8af30fbc33", 0x3c}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) fchmod(r3, 0x1) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x4100, 0x0) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x20000) ioctl$NBD_SET_SIZE(r5, 0xab02, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000000c0)=0x1) 18:18:40 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:40 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:40 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:40 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x8, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:40 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000200)) r1 = socket$caif_stream(0x25, 0x1, 0x5) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/184, 0xb8}, {&(0x7f0000000280)=""/248, 0xf8}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/212, 0xd4}, {&(0x7f0000001480)=""/206, 0xce}], 0x5, &(0x7f0000001580)=""/108, 0x6c}, 0x2) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x2, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5421, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:41 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200800, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5450, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:41 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x9, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xa, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:41 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:41 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:41 executing program 4: r0 = memfd_create(&(0x7f0000000100)='em0%\\vmnet0trusted!\x00', 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000140)={0x3, 0xf7, 0x446, 0x1000, 0x7fffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x86000) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x3000, 0x1}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000000)={0x34, 0x0, &(0x7f00000000c0)}) 18:18:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5451, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:41 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xa7f, 0x82) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f00000000c0)={0x1, 0x0, 0x1012, 0x1, 0x9, {0x3f, 0xa38}, 0x1}) 18:18:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5452, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x5460, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:41 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0xfffffffffffffeeb, 0x0, &(0x7f0000000040)}) ioctl(r0, 0x2, &(0x7f0000000280)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@empty, @broadcast, 0x1, 0x8, [@remote, @dev={0xac, 0x14, 0x14, 0xc}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x12}]}, 0x30) 18:18:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x40049409, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:42 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x4, 0x90280) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000180)="a2cd0d0bb35a72ec87527d61966e7e1503c51a04368b56ca81cae9ba2e1e3908dc908ef48f9d494261626ee0862dc38226439f10334b1919102e6aecb18db8d8012240509bd97ccb893ed1fa304e3d3d72009ea8d3dbb6001e48b401fb14e6568d6035ff9fca205d503f78e1ee73f205b071db5e1e8ad00a3ad3e046886d58c6e77e97250142f136817475e1035687224c6424f8fa44e3f1a63948b1df0aa1e8b607778e77df", &(0x7f0000000280)=""/7}, 0x18) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) mq_getsetattr(r2, &(0x7f00000000c0)={0xff, 0x9, 0xfffffffffffffffd, 0x8001, 0xb7, 0x8, 0x10001, 0x1}, &(0x7f0000000100)) 18:18:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xb, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:42 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xa, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0x4020940d, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:42 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffe66, 0x0, &(0x7f00000000c0)}) 18:18:42 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:42 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0045878, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:42 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xb, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:42 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6f0, 0x800) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x2, 0x8, 0x7, 0x3}, {0xfffffffffffffff9, 0x6f56, 0x6, 0x4}, {0x2, 0x4, 0x400, 0x7}, {0x3, 0x9, 0x2f53, 0x80000000}]}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0045878, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:42 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400800, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000100)) 18:18:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0189436, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xc, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:43 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc020660b, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:43 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x1, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000200)={0xd, 0x0, &(0x7f0000000180)}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000100)={0x800, 0x100000001, 0x7db, 0x20, 0x4, 0x7fffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x9}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r2, 0x3, 0x8, [0x585, 0x0, 0x5, 0x3, 0xc20, 0x400, 0xf8b4, 0x3]}, 0x18) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2100, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) 18:18:43 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xc, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:43 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x34927c, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0x0, 0xfffffdfd, 0x0}) 18:18:43 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) pread64(r0, &(0x7f0000000080)=""/23, 0x17, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000140)={0xffffff50, 0x0, &(0x7f00000001c0)}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/240) 18:18:43 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:43 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x0, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:43 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = msgget(0x1, 0x184) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000280)=""/4096) 18:18:43 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xffffffffffffff9f, 0xfffffdfd, 0x0}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x84000, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SIOCRSACCEPT(r1, 0x89e3) unshare(0x0) 18:18:43 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000100)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x29a280, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000002c0)={r3, 0x1, 0x6, @local}, 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x8001}) sendmsg$inet_sctp(r2, &(0x7f0000000840)={&(0x7f0000000340)=@in6={0xa, 0x4e20, 0xaf, @dev={0xfe, 0x80, [], 0xe}, 0x40}, 0x1c, &(0x7f0000000740)=[{&(0x7f0000000380)="1cc99e68c179d5f7cc4d36dc0958971f088077eedcf743a0db2d55bc3b1f3010f44b8547b601866c0727026af4", 0x2d}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="85213e4f1d4590566d285d92df315b8a2ee6bb12e2fb2093d6334336601be9efced1e4baeeb24ef12a1064709069225a5eb3e90cd164242c9c80f4860d93934b8bffcab31c7a722a77ef92f44b700c1ee4c25a3d6abd9e29a60a5bc2695f9cfab99d5fa2d5a852fa4f9de3967dd9fcdbbff6520d45fc7a2d26e73faa6c2c91650dba72f36f52216a69e524798e6560f9053667b70b157fa26d3cd78444ca4b7991bba98a442e9b45ef1161e0e2bb21", 0xaf}, {&(0x7f00000004c0)="2175e620d29e9fb4f0aa94904adbac41d05404bda8a8c433c6b9be85aa632c7ff26ece3706c626ef760707813f26bcaf0b12b0f823d82cfdef859f0f0715ef3f664e6efa2e658356ae31472ff698bb256fc0f06c1d9b87306fb1d640f16f81f2ed4618d8d74bc43241d9cde70fbd4c96930ad09c04f456eb3785467527d73789e57abac92f89ecca55d4cf78409db17ee6f5", 0x92}, {&(0x7f0000000580)="f5f1fda9c9d31aca2389edf20d7e94bfcb4f2f2a55ce9964080c602eed9a6ecbe644dc83d4aac200122174d3d505670c99bbe9844738b066b9f58613250a8012874d7e3151af7369854482bfde0c15dcf697d323186cae41a9c6950ef36c3910e18f812076f0a0350c2ab77d86bb7f2643fb66cf2402a80a829491012cdaef3253beea5227f9fb32a1cb3b13102fb89bdbfb53bb", 0x94}, {&(0x7f0000000640)="21daf849abe66b073121d0ded30be6abf11e88589392a0cce51667835b95f91f36b59054e3f14b2e473879263de0589ed3256b3b5c1f787705e13b46c4cd9e32b147e6261b5734dfe257c3e5926ff59685777fc56c8ad71dd2e1feae82568dc7ed15b32fcd8556e71febc40cfb66c81bfd8753b20453fdeb89ffeac7d8f938d4ca5045c83c0f530eea2cf4adc10a87292393eec77310e9bb01a2198812e4ef94b2cee4062fc287535936a9205915b05a0ac46cde92e5892fadae0841043fe542bef4850f36db587f3f54e52ac86e8979cc256c21d279b00a63b6ecea448ad58d9beeaa8a59532f0d7a75e0defc4cfdff83ca78e69f472854", 0xf8}], 0x6, &(0x7f00000007c0)=[@authinfo={0x18, 0x84, 0x6, {0x1}}, @init={0x18, 0x84, 0x0, {0x27, 0x6, 0x4, 0x3}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x5e}}, @dstaddrv6={0x20, 0x84, 0x8, @local}], 0x68, 0x41}, 0x4) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000300)={0x400, r4, 0x10001, 0x2}) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:43 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x0, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:44 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x14, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x202, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000040)=0x200) 18:18:44 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0xfffffffffffffffe, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x0, "dd201fc915020082"}) creat(&(0x7f00000000c0)='./file0\x00', 0x2) 18:18:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:44 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x0, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x109280, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x25c, 0x8, 0x3, 0x200}, {0x8, 0x7fffffff, 0x1ff}, {0x6, 0xffff, 0x101, 0xffffffffffffffff}]}) 18:18:44 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x200001, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:44 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:44 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000040)=0x800, 0x4) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xffffffffffffffc9, 0xfffffdfd, 0x0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000140)="5a443f47cc6da1d0872b5b5f7819173a1baeee012317164d27d1dd", &(0x7f0000000180)=""/66}, 0x18) socket$inet6(0xa, 0x80000, 0x5) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 18:18:44 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$poke(0x5, r1, &(0x7f00000000c0), 0x2) 18:18:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0xffffffffffffffdb, 0xfffffdfd, 0x0}) 18:18:45 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x94, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:45 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x93, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:45 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:45 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x0, 0xfffffdfd, 0x0}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) 18:18:45 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xb9e4, 0xc040) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 18:18:45 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40100, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000000c0)={0x4, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x2, 'wrr\x00', 0x14, 0x6, 0x7f}, 0x2c) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setregs(0xf, r2, 0xfffffffffffffffc, &(0x7f0000000140)="c31a1c3b973f47bad9e43839f8463ab7bb1f536df10ccd391f7d1e54b80b3e503a57b99e58e67f0d3bf6ed66e65b9da5fc4adea4b945718bd13f90c9cea44445bb7a4cbf1a79fc1b1cd0a1317b73238e2772bffff1bf5b77e71946d345e254469aba1c77e968115d8239822d419d4a6d31380cc869c7bdc6c97f5497e168e41ef40ae3eb6cc5fcc257f32617e2ea712a725e894335c9811d94f1a57c26770e6535960daa61") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x8, 0x0, 0x2, 0x9, 0x5, 0x3, 0x10001, 0xffff, 0x0}, &(0x7f0000000280)=0x20) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000340)={r3, 0x0, 0x3, 0x6, 0x3, 0x0, 0x4, 0x1, {r4, @in6={{0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast2}}}, 0xfe9d, 0x81, 0x5ae0, 0x3, 0x5f2}}, &(0x7f0000000400)=0xb0) 18:18:45 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) 18:18:45 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:45 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xbf, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:45 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x10040) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x1) connect$rose(r1, &(0x7f00000000c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) 18:18:45 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x801, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:45 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:45 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x1393f, 0x0) 18:18:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x94, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:46 executing program 4: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x40) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000080)="20756e9b1d0aa376c2d50d9ea79caaf3723d57e6d842ac5b3efdaec6f0e8fb4e437ccb9e905b73504be209c887c46c782a39ddb3fe149596b7b406e5eb39940dd2ad668d0566183e65375baf359df241e7fb818068fe562ae45254c881105c663bf466235307bac6116c404f1de376a198465a41d5417518d9ab2fa164d5a8bb9f2595ee57f857a2742312edfc24555342951bc9b8d57d363e9fe82743bba085321bebc2330a792f154c5f2ee6f905dcfd9fbb6357c180e9c1631f6a80a0a3c7a643863909a7abe16688f1ec8307efa9c20639d8d952bae19e54d078") ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x6) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) 18:18:46 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:46 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xfd, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:46 executing program 1: r0 = fanotify_init(0x0, 0x40800) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f0000000200)={'#! ', './file0'}, 0xb) io_setup(0x8, &(0x7f00000001c0)=0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}, 0x10) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x0, r2, &(0x7f0000000040)="100000000500000000", 0x9}]) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0xfffffffffffffdd4, 0xfffffdfd, 0x0}) poll(&(0x7f0000000000)=[{r1, 0x40}, {r1, 0x408}], 0x2, 0x400) open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x1) 18:18:46 executing program 4: r0 = gettid() r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x802, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0xa5, 0x3f800000, 0x4000000000000000, 0x0, 0x7fffffff, 0x80, 0x4, 0x8, 0x9b08, 0x8, 0x80000001, 0x5, 0x7, 0x7, 0x6, 0x83, 0x7, 0x3, 0x7f, 0x10001, 0x36, 0x1, 0x8000, 0x6, 0x8001, 0x100, 0xffffffffffff00bb, 0x6, 0x0, 0x9, 0xfffffffffffffe01, 0x9, 0x83c1, 0x2, 0x6, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xcb66}, 0x4090, 0x9, 0x7, 0xf, 0xffffffffffffffff, 0x7ff, 0x3f}, r0, 0x7, r1, 0x8) inotify_init() r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 892.267083][ C1] net_ratelimit: 20 callbacks suppressed [ 892.267090][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 892.272801][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:46 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:46 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x5, 0x40, 0x4, 0x8, 0x6, 0xfffffffffffffffe}, 0x1}, 0xa) 18:18:46 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x3ff) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000000c0)=0x26a3c2d7) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7ff) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:46 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:46 executing program 1: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) open(&(0x7f0000000000)='./file0\x00', 0x10942, 0x7) 18:18:47 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000140)}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x9, 0x1000, 0x4b55e1a0}) write$P9_RATTACH(r1, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0xb, 0x3, 0x43e58bbd}}, 0x14) 18:18:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xbf, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:47 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0x0, 0xfffffdfd, 0x0}) 18:18:47 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x300, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:47 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xffffffffffffff07, 0x0, &(0x7f0000000040)}) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000000)={0x3, 0x20, [0x5, 0x781, 0x101, 0x80, 0x7f, 0x9, 0x0, 0x4]}) 18:18:47 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0xa000, 0x0) ioctl(r0, 0x6, &(0x7f00000000c0)="a7cf18c3d757edde4925522614e7a9e33d705a5a533e6de5187545826b1e264c28eab2cb97aa2df1e57711acc7ddbc0d44e47cfb31b00e91637f0d3c9de15207d00cff04a1859fbe36b83046d961b9f2f85f0ce9d4af4aac605b7e91ffb56db52e8427bb261f06a2da916243791ef07574d307f7e4f501bda1b290a30c38905a83") ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x36, 0xfffffdfd, 0x0}) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x20000) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4657, 0x8040) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x1000, &(0x7f0000000200)=0x1) 18:18:47 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x800fe, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000180)={0x6, 0x3, 0x6, 0x0, 0x400, 0x1, 0x6, 0xac, 0x0, 0xff, 0x10000, 0x8, 0x0, 0x4, 0x8000, 0x0, 0x4, 0x4, 0x1}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000001c0)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0xff, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x1, @remote}, 0x0, {0x2, 0x4e24, @rand_addr=0x7}, 'hsr0\x00'}) accept4$inet(r2, 0x0, &(0x7f0000000200), 0x80000) 18:18:47 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:47 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x500, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:47 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0xfffefffffffffffc, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:47 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x30880, 0x0) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f00000000c0)={@null, @bcast}) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000000)={0x4800000000000000, 0x10, 0x1, r1}) 18:18:47 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:47 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) pread64(r0, &(0x7f00000000c0)=""/160, 0xa0, 0x0) [ 893.947061][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 893.953153][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xfd, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:48 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x40) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000000c0)={0x3ff, 0x0, 0x2, 0x4d}) prctl$PR_SET_FPEXC(0xc, 0x10003) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0x8, r2}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000180)) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) chdir(&(0x7f0000000140)='./file0\x00') 18:18:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x30000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:48 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x800002, &(0x7f0000000140)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x90}}, {@sq={'sq', 0x3d, 0x1}}, {@rq={'rq', 0x3d, 0x401}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/ion\x00'}}, {@subj_role={'subj_role', 0x3d, '/dev/ion\x00'}}, {@seclabel='seclabel'}, {@hash='hash'}]}}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000840)={0x3, &(0x7f0000000800)=[{}, {}, {}]}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000002c0)=@security={'security\x00', 0xe, 0x4, 0x4b0, 0x0, 0x0, 0x2c8, 0x118, 0x0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x4, &(0x7f0000000280), {[{{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x0, 0x5}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x10000}}}, {{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x32, 0x80000000, 0x4, 0x0, 0x0, @remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2, [0xffffff00, 0x10c0578bcf046631, 0x2354056e211ce0b1, 0xff000000], [0x0, 0xffffff00, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0xff, 0xffffff00], 0x1c18, 0x8}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x0, 0x9, 0x8, 0x0, 0x48, 0x80, 0x108}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x4, 0x36b, 0x2}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@inet=@dscp={0x28, 'dscp\x00', 0x0, {0x96c}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x80000000}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) 18:18:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:48 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x900, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 894.347080][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 894.352959][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:48 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xfe, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:48 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x80, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x181000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x800000000001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0xa) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="190040e37540fcddd66ff9afee00005bd0b2bb42be009760002bef01005b888ca4eb00c1e7c4fed61456699dbcb3d4f9b76bf00095a39eb7ff"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = socket$isdn_base(0x22, 0x3, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f0000000180)={0xd6da, 0x8, 0x7, 0x1f, 0x6, 0x8}) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:48 executing program 4: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x80000, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = socket$isdn(0x22, 0x3, 0x1) sendto$isdn(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="c00000000100001eb6718a598bf41b5b739a1a481aa21136ca669b111dcc2215c0eaa0e425fbb66da623a4d8ca3064ac10be40dc233983b9b4bd80eb339f6dcdf61405aff69a35bb14ef3206bd42e85728f926d88ef083954628897d9b713eb6b5a3ca60cd7c6e1ebea7a3158adac8400cb382e143df94dd2f3748ba986d1986dd613b739308dc4c8ce975e5236367133e0264155742f6d9271af7221cdb29b20071b7fb8b33b73362cba2b7bbb9925593111258a2d8e50e650e575bac102701fc46e2a8f1f8687937643a7346e7650f4269d8b2c08f2cbafabeb8ad21c13c6c891e98a8548112f105b52e1343d017c56709f6262403ff9933fbab7d07c9cec953680b096213117dde4ac87cf6bb0f483d"], 0xb9, 0x0, &(0x7f00000001c0)={0x22, 0x1000, 0x3ff, 0x5, 0x100000001}, 0x6) personality(0x40000) getrlimit(0x5, &(0x7f0000000200)) setrlimit(0xb, &(0x7f0000000140)={0x7, 0x1a}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f00000000c0)={0x0, 0x0, {0x8, 0xfffffffffffff1d9, 0x703f, 0x5, 0x5, 0xb, 0x3, 0x7}}) 18:18:48 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:48 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = msgget(0x3, 0x518) msgrcv(r1, &(0x7f0000000000)={0x0, ""/45}, 0x35, 0x3, 0x2000) 18:18:48 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xa00, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:48 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400000, 0x0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000080)={0x7, "5fa314df1f4e191c38203cccf2879ce450a693bbea0000eb72bd30c170d2d0a4", 0x0, 0x1}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000000)={0x0, 0xfffffdfd, 0x0}) 18:18:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6, 0x10000) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f00000000c0)={0x9, "114bd71de1d6229ea57003366be8dca628c4a21c290d99ee0b0b34142c2b600e", 0x100, 0x80000001, 0x3, 0xc, 0x7}) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000140)={0x20, 0x2, 0x80000001, 0x5, 0x1b, 0x6, 0x12, "361abbf2c6a9d4af3d19a17e7fae06c1061599fd", "5d72ca2e9c24f95ed64fbe1fb1d03d6c270465d5"}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0x6, 0xfffffffffffffd57) 18:18:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x2}, 0xf) recvfrom$inet(r1, &(0x7f00000000c0)=""/29, 0x1d, 0x40010100, &(0x7f0000000100)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) 18:18:49 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xb00, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x9, 0x1, 'client0\x00', 0xffffffff80000000, 's\rr&\aJ}6', "ca1a8baf50a28d56f49522f2e32a8d75e0e9adcb71641e415cd7d45b020fbb0d", 0x1ff, 0x2}) 18:18:49 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:49 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7, 0x7b, 0x2}, 0x7) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x1, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x300, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:49 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x10000000000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:49 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:49 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x10000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_dccp_int(r0, 0x21, 0x7, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x86dd, 'caif0\x00', 'veth1_to_team\x00', 'syzkaller1\x00', 'veth1_to_team\x00', @remote, [], @link_local, [], 0xe8, 0xe8, 0x118, [@ip6={'ip6\x00', 0x50, {{@dev, @ipv4={[], [], @initdev}, [], [], 0x0, 0x11, 0x9d1e}}}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}]}, 0x220) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="d4010000", @ANYRES16=r1, @ANYBLOB="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"], 0x1d4}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x8, 0xfffffffffffffc01}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000080)={0xc9, 0xfffffdfd, 0x0}) 18:18:49 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0x1a2, 0x0, &(0x7f0000000040)}) 18:18:50 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x400000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34}) 18:18:50 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xc00, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 896.027783][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 896.034155][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:50 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xad, 0xfffffdfd, 0x0}) 18:18:50 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ppp0wlan0\x00', 0xffffffffffffff9c}, 0x10) ftruncate(r0, 0x80000000000a) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:50 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x400) ioctl(r0, 0x7, &(0x7f0000000040)="bad09c6b297a89f36c437562b68f75ea0e0f4a89864d015fcf4c7b8e8c4b99e9ae2526252ea925ab30abb69534ed3aef68420ec9a968570236") r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) [ 896.427681][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 896.434511][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:50 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:50 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000140)={0x7, 0x5, 0x1, 'queue1\x00', 0x8c6}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000200)={0x34, 0x0, &(0x7f0000000040)}) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e20, 0x2, @mcast1, 0x9}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e21, 0x3, @empty, 0x5}], 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0), 0x0, 0x5}}, 0x20) 18:18:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x500, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:50 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x43e080, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000340)={0x4, 0x1, 0x800}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) r2 = geteuid() getgroups(0x5, &(0x7f0000000080)=[0x0, 0x0, 0xee00, 0x0, 0xee01]) fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, r3, 0x100) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x108, r4, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xd8, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x63990664}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcf83}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x4040080) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) 18:18:50 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x1400, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:50 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:50 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:51 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x31, 0x0, &(0x7f0000000040)}) 18:18:51 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x10001, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000000)=""/116) 18:18:51 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x8100, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:51 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0x19, 0x0, &(0x7f0000000040)}) 18:18:51 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x800, 0x9d0c}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r2, &(0x7f00000001c0)=0x4) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:51 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:51 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6e61740000004000000000000000000000000000000000000000993af821000003000000004900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000080)={0x0, 0x0, [0x81, 0x10000, 0x7db, 0x400]}) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000140)={0x34, 0x0, &(0x7f0000000040)}) 18:18:51 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) 18:18:51 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x900, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:51 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x9400, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:51 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = dup(r0) setsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000000)=0x800, 0x4) 18:18:51 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)=0x1fffffffe000) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f00000000c0)=@rose={'rose', 0x0}, 0x10) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x8, 0x301240) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000180)={0x7fff, 0x2, 0x1, r2}) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x144, 0x8000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x3) [ 897.787183][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 897.793084][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 897.799009][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 897.804864][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 897.867074][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 897.872954][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xa0000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}}, 0x3f, 0x75d}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0xce43, 0x200, 0xd6d3, 0x40, r2}, 0x10) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000100)=0x7fff) 18:18:52 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "2f9047c506c467bfafc3"}, 0xb, 0x1) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 898.107841][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 898.114254][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x80, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2040, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f00000000c0)=0x5) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000040)={0x8001, 0x3, 0x0, 0x800, 0x9, 0x0, 0x2}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000280)={0xbe0c, 0x2, 0x6, 0x0, 0x0, [{r0, 0x0, 0x10000}, {r0, 0x0, 0x5}, {r1, 0x0, 0x4}, {r1, 0x0, 0x631a}, {r2, 0x0, 0xfffffffffffffff7}, {r1, 0x0, 0x8}]}) ioctl$SIOCRSGCAUSE(r2, 0x89e0, &(0x7f0000000100)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) 18:18:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) bind$pptp(r0, &(0x7f00000001c0)={0x18, 0x2, {0x0, @empty}}, 0x1e) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x107) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 898.371582][T28882] QAT: Invalid ioctl [ 898.407582][T28882] QAT: Invalid ioctl [ 898.444414][T28882] QAT: Invalid ioctl [ 898.473284][T28882] QAT: Invalid ioctl [ 898.496474][T28884] QAT: Invalid ioctl [ 898.507593][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 898.510350][T28882] QAT: Invalid ioctl [ 898.514610][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 898.569531][T28888] QAT: Invalid ioctl [ 898.577828][T28887] QAT: Invalid ioctl 18:18:52 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:52 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xbf00, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:52 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000100)={{{@in=@initdev, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) getresuid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) socketpair(0x5, 0x80f, 0x7, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f00000006c0)=[@in6={0xa, 0x4e21, 0x37d6, @loopback, 0x9}, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e24, 0x8, @rand_addr="d0d7d259062432729abd58a92f9f4258", 0x1000}, @in6={0xa, 0x4e22, 0x5a1, @ipv4={[], [], @remote}}], 0xb0) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010003000000000002000100", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="02000700", @ANYRES32=r3, @ANYBLOB="06001939", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000500", @ANYRES32=r6, @ANYBLOB="040007000000000008000400", @ANYRES32=r7, @ANYBLOB="1000010091da00000079ad006fa3de361682762036e76243dd2efeb22ebe2d2cc173c65eb2176903711597631d5809000000d3b14233fa7357642f309cac5f7d858dcfd089ababcc1cd53c0213b8371fff95ae35932ad43c519f50bc769ec7228e631ee51c659d8c87678d00f81c92e7f97bf2cec47bf28bb97543550e2a"], 0x5c, 0x1) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r9, 0x4c02, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x16, 0x18, "dcfced31a5bef6e21704d39c564bab39b8e19fcf10dfd1641220a3d1cf39a5110b8e95ec8f0d11dd483c8ef0eeaff9fc6af5a49ea5ca80fe21fe7837d997ee65", "ff4525a3df3351fcffb983a692dd56d5b4b55cec984d38beac9dd1ca5ef38bd5", [0x5]}) ioctl$VIDIOC_LOG_STATUS(r9, 0x5646, 0x0) 18:18:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101002, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='/dev/ion\x00', &(0x7f0000000100)='/dev/ion\x00', &(0x7f0000000140)='/dev/ion\x00', &(0x7f0000000180)='/dev/ion\x00'], &(0x7f0000000440)=[&(0x7f0000000200)='/dev/ion\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='/dev/ion\x00', &(0x7f0000000300)='(\x00', &(0x7f0000000340)='\'trusted&ppp1\x00', &(0x7f0000000380)='/dev/ion\x00', &(0x7f00000003c0)='&-*%:^-self\\vmnet1\x00', &(0x7f0000000400)='/dev/ion\x00'], 0x800) openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f00000004c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000480)={0xfffffffffffffd7e, 0xfffffdfd, 0x0}) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x60010, r0, 0x180000000) 18:18:52 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xa00, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x100, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:53 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e23, 0x2, @local, 0x88f}, {0xa, 0x4e23, 0x1ff, @rand_addr="92863e48b89f167a7d5d58344a65502f", 0x4}, 0x20, [0x200, 0x93, 0x2, 0x53, 0x9, 0x6, 0x400, 0x9]}, 0x5c) 18:18:53 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000040)={0x3, 0x0, 0x9, 0xffffffff80000001, 0x8, 0x0, 0xfffffffffffffff8}) 18:18:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x9, 0x404040) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) 18:18:53 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xfd00, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c00030008000500"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3ff, 0x20000) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000100)=0x9bbc) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0xc) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000000)) 18:18:53 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:53 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) inotify_init1(0x800) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x5, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) 18:18:53 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:53 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x1c) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000280)={@remote, @multicast1, r2}, 0xc) r3 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x20010, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f00000000c0)={r3}) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$setflags(r1, 0x2, 0x1) 18:18:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xb00, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:53 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x4, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:54 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xff00, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0x769bd0fd, 0x4) 18:18:54 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x80000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000180)={0xfffffffffffffcf8, 0x0, &(0x7f00000000c0)}) 18:18:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:54 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x6, 0x20000) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000140)=0xc00000000000000, 0x4) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4338, 0x515080) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = dup2(r0, r0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r3, 0xc040564b, &(0x7f0000000000)={0x100, 0x0, 0x3017, 0x3, 0x1, {0x1, 0x4}, 0x1}) 18:18:54 executing program 1: r0 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x90800) r1 = syz_open_dev$sndmidi(&(0x7f0000000400)='/dev/snd/midiC#D#\x00', 0x3, 0x20400) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000440)) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) write$eventfd(r0, &(0x7f0000000500)=0x5, 0x8) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffff, 0x80fc) socketpair(0x10, 0x6, 0x7dd65458, &(0x7f00000005c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x10001, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000580)={0xffffffff, 0x1, 0xfffffffffffffffe, 0x7, 0x8}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0xfffffffffffffe00, 0x8, 0xc56, 0x7f, 0x0, 0x4, 0x5, {0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x6, 0x9, 0xa9e, 0x3, 0xc56}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x7, 0xbe, 0x58, 0x2, 0x2, 0x101, 0x7, {0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x100000000, 0x1, 0x0, 0x10001, 0x2}}, &(0x7f0000000280)=0xb0) socketpair(0x4, 0x805, 0x8f5, &(0x7f00000004c0)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000540)={0x0, 0x2, 0x8, 0xff}) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000002c0)={r4, 0x410, 0xffffffff, 0x4, 0x7, 0x8, 0xffff, 0x10000, {r5, @in={{0x2, 0x4e23, @local}}, 0xfff, 0x101, 0x0, 0x9b, 0x6}}, &(0x7f0000000380)=0xb0) 18:18:54 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:54 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0xfffffffffffffffe, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2000) 18:18:54 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:55 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x20000000000000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xffffffffffffff6c, 0xfffffdfd, 0x0}) 18:18:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xc00, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:55 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xff03, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:55 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x121100, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 18:18:55 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7f) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) getsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 18:18:55 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:55 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0x0, 0xfffffdfd, 0x0}) 18:18:55 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x900000000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:55 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x141800, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = getuid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4000, &(0x7f0000000480)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532342c616e616d653d23235e5b776c616e3163707573657470726f636e6f646576c573656c696e7578757365727070703123002c6163636573733d636c69656e742c616e616d653d2f6465762f696f6e002c7569643e", @ANYRESDEC=r1, @ANYBLOB=',obj_user=/dev/ion\x00,uid>', @ANYRESDEC=r2, @ANYBLOB="2ced006663ce0eab5c6f07966f6e746578743d73797361646d5f752c66756e633d4d4f44554c4554e17a63ab279ac8f320140738a9d08dff40833b57a097f353ec8179ac12b6f33a7cc0062b33271c7d75438261354db1d5286773095fa7a485b4cdf2dba1e61b2a13e58fb224ac6687bf4d92256dadf6df1379c1a4020e0133cdd0871493790161c77ef34e24737884765af65b204f1be336b7af6fd1e699ed36fe36b11788c748ae1c2a4eb974c2939f49705b388803b93b0153740c7d6d33890977", @ANYRESDEC=r3, @ANYBLOB=',\x00']) 18:18:55 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:55 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0xfffffffffffffffe, 0x1, 0x1, 0xffffffffffffff9c}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:55 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x40000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:55 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x3, {0x2}}, 0x18) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x8100, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:56 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:56 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x101000) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x200, 0x0, 0x16, 0x2, 0x4, "bc226d58662680390cedfed48fbe4da21cd943393b440615a5fad464b54479c32ccdd771a4af4737474dbac095c4629c6e67a0847a57bb7d0e716232e9d54dff", "357ac0b202d6dd996ce8b50a7569dde03558ea61be8e2cf15e5f83be541fd5a6ff22d567741dea2efa728c3fdb6dfa6bbc30172613e5dbd58e12d76bc9ef1ff1", "d0e7610d1c2bf31735a221b6bdbc36790a2562c46a381288f5a2b1188ba74e82", [0x9, 0x10000]}) 18:18:56 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xeece) 18:18:56 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xed, 0xfffffdfd, 0x0}) 18:18:56 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x34}) 18:18:56 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:56 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="297e770612e11f4c93ffc325eb05071b", 0x10, 0xffffffffffffffff) keyctl$update(0x2, r1, &(0x7f0000000140)="a241cc7a84c0c223a260685befca6d9fdd7b39769bdb007a366435b53f2c56401565588a7f5289e09a31769f3ae11d3febcfdb93b55d115da32a841b18e8c11b74e55b1baf69e99da2478ee5fcd3c161f5abd4d7d13b7d918695f55cc2f3288fea3653dddc35df1d4c25469a05a7f34f719e4b02", 0x74) 18:18:57 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:57 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) alarm(0x7ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 18:18:57 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x200008003, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x2ab, 0x0, &(0x7f0000000100)}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$TUNSETLINK(r1, 0x400454cd, 0x2ff) 18:18:57 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x140000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x9200, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 902.907092][ C1] net_ratelimit: 15 callbacks suppressed [ 902.907101][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 902.918570][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:57 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x402) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0xbc, 0x1, 0x1, "9bc568b2bf458e78c8734a0937d4b31d", "728fb32c68acda27ef806cb35f05d04c457a0fa20f280dc4092f93a58e5ff64a2e9bf8e72fa91c0d3a14c63d11d203e5c8c989b2e89d0a65a7cbb16e9093324b8e6c7499b623554872c12812d9c9a2f0ddf1592d9aa8bc51b17cccf27dc9fc3c4c4fdfedb97cf17dbd12cd538cddfafb479dce4f9f7dbd626e4ba18e78f2b6d9b71455ca37f6a399912c0468f3852b3ab8dbc73754592481c8cfb805887268052b2e78eb065281"}, 0xbc, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x1f, 0x4) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:57 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x40000000000000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:57 executing program 1: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:57 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:57 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x200, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x9, 0x20000) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000200)={0xfffffffffffffff3, 0x0, &(0x7f00000001c0)}) 18:18:57 executing program 1: r0 = pkey_alloc(0x0, 0xfffffffffffffffe) pkey_free(r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x6400, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x6a04, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x401, 0x204000) 18:18:57 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f00000000c0)='./file0\x00', r2, r3, 0x1000) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:58 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:58 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80, 0x1) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="74a6382c20f322b8137a4f2320e466d8", 0x10) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x6, 0x100) 18:18:58 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f00000000c0)={0x7, {0x10001, 0x7, 0x5, 0x1}, {0x200, 0x1, 0x6, 0x8}, {0x1, 0x400}}) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) recvfrom$llc(r1, &(0x7f0000000140)=""/91, 0x5b, 0x100, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:58 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x234e00, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 904.027067][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 904.032879][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 904.038711][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 904.044439][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:18:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x9300, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:58 executing program 4: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="438bf4101531e347e6bf2c1b0ada5e954d0f494b89274df25acaec8ce74aed56e0d0ca05f92cd0e92cbc27116ebc92334408274e72fa771d39679ecbca72daf4d7e2d4a13c01c2cabc42e2ca151495bbc3d7d0a59e100030b6de256c3fdf3d5b54e0a2b2ebb2cfa83267c39375749633b884ad00138a5cfe8413170c40d64163af4189d7ccdea0da51a05472bb345a3065ca45e16b5824dadd0a5731cd7e889d57ee19e135f86bbb6e95474e269c1c3917985e2611372bb38f7cb6478f2515df20dec4d105e249bcca5a", 0xca, 0xfffffffffffffff8) keyctl$setperm(0x5, r0, 0x1000000) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) [ 904.107079][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 904.112895][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:58 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000040)}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x7fffffffffffd, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x22, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0}, &(0x7f0000000c00)=0xc) fstat(r1, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000cc0)=0x0) r6 = getuid() getgroups(0x3, &(0x7f0000000d00)=[0xee01, 0xee01, 0xee01]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000d40)=0x0) r9 = geteuid() lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0xffffffffffffffff, r0, 0x0, 0x22, &(0x7f0000000e40)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0xffffffffffffffff}, 0x30) r12 = geteuid() r13 = getgid() sendmmsg$unix(r0, &(0x7f0000001040)=[{&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000200)="537730c71fec8400d02c9c5744dbb9405057cf41a14e8cb583c29369dbe68eb4a441c0af08651b1ea6aad9f0844a915f77ddb93905a3018de2114eebca4179267440b3ca5ca82c63cf937edcc322", 0x4e}, {&(0x7f0000000280)="af3cb14cde9b75164fa17019c42c00d6ff284a239d0fd28bdd84399edd128300274897fa7e9f1f739b34327908f840e9132e8186871e6f8e7c6c34c31ddf307418ddfec5097e0f6742f40c90a738fbbae0860210281a24878a581046a4a3e2e7c0c8fd04ede0b6ba13834dabbcd31f8a64eda13ea38c97c5dd2a5d566aba3f96469dfb205385db8583a34606089766675f58c645bd9b309e5f09737ca11e666d21647a8f66f412341f22820f503eb02afbdfd4883969a428a372587f07c1dfe8fc3381789cb8767e9a28d9a393baa7", 0xcf}, {&(0x7f0000000380)="4dffb31ce04161bd8fb179b5de5422ff231e5407a9969860b3a8999f5c976d8053cb31a86a81673c89a3a508b17bcd6534922c6132eb41fc8308f19aad9121319a8c5ba08d201e1d", 0x48}, {&(0x7f0000000400)="51381e6351d0a90bcaaf86199d6492ecccfa9a881461f239dd9435da577efc5fb68d734d679c9caf08bb61c3877001a4ba5d2b2e8cb258fee9e58061d12a6324076f43edcb139d7ddfac8bfb7b91aa0e556716ddb8e8fb82073c0d5730e7282204c3763f06985abc950fbc9dc35fffcdcb050451fa1985332baca7d3ae619d66fc0bacc4c59741d83888eee93dfb571afb6566f7db4923706dea87da584ea20272f7c3a44b02f46ca042fe39b462031c8ee06f1f145773af93dc247972957822cb70e3b3d8f122f240a9e6d015952465fe38396a099a66c2f892", 0xda}], 0x4, &(0x7f0000000500)=[@rights={0x28, 0x1, 0x1, [r1, r1, r0, r1, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r1, r1]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r1]}], 0x80}, {&(0x7f0000000580)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000600)="595f0a21af244b43d753c21904f4c6c0a684c521bf76852ace2617c445c912d84fe09f4b92c22f8a0d68dfd890f473ff3421d2ebef9024dd6e6b38eeb0ac506b8a0f351a6fbc92568f5f75b3669aa27bd8418aaaf02162edd7a4c18d1f782c238c29d1867cdffe401ee250c022034392", 0x70}, {&(0x7f0000000680)="3f09d661b7ec32c6d5bf5cfcc01347f9849ffbfde2262ef5e036042627fe0b28030b7621fd5cb14689a68104651f29970bccbe5c25260d1b34aaf88b195fc7c0789e108833d03b7a1dafbe23de08f044923742cb6b5a9de598005bd52db2bb4f2994bc6e3873c4f70a33fd00a826ac41895ab336dc585c2d0d21da8eabcc86613cd419692db84cae628605f952850c4339720741e319780331af3c6ebf08ba12b2bb4f80e2b058a68d4aad5e4728e20d69c7c72700f8335baaf1a6fbfe194b63a73d2d70c1ab3e036b343082931e518da6c541c84341c03be1f97a5cd6852773", 0xe0}, {&(0x7f0000000780)="b72cdfa3c067ec442fd7552fc08609a7aed53b3f415e3c27348de6139ad22a373c2a6eaa94a9be0be8c3f4bfc644631045a4a5b74563539f0887bc", 0x3b}, {&(0x7f00000007c0)="93f56214c0de17f1623e41347f2ff350260f3a983c6249a1463b90c002e38896d898c460762026a068d6a432ed0e285ddf9b1c34f795d2bcf6e74711c746eb9bad32a7326335e708086e465d080b0af22b06b432ddbfc7eb77d33fffe2da0f45a6e994a5fc6db4a0bdb5b6b2253e1cda5e9f8a4ce1903ed055c6aee0229ba2679e70407a4d221269f3a8cf088c22fe9070c9c7650633523aeaca2f99313235ffc0bb2350", 0xa4}, {&(0x7f0000000880)="7cc21ed85986b28bc2696f1974220e11ec844454d248a64be00954374223541b71a622eab5368f4923ec527e8e80a1bcc55bb304d55b1a517ffc8ed27cfc530486274fff836d865f2d955ac14a934d83259e310b1ce5c6aab6d488eeb410dda6f610a40b9297f1aa4861254cf27335927d8c04b9197509d9e37188fd113dfef06819735e1cead46a0475d7d8e243c7e049a3ab6892cecd4d313340520967be6b9218f2a75a58c1ca8b97aa15ce6158161d0d2f964568300f", 0xb8}, {&(0x7f0000000940)="0410e324486d6c7b385f287ae5db03030ebab217a15e9948ce167ae5b7baeae6d35a885baded8e79a5b7d0662ddaa96adc9a1833bb13c5c9d582c3dc4b924ddf013b2afd3d8538eb73564672bc", 0x4d}, {&(0x7f00000009c0)="987cacd99bda5651caa4e0e7ee5fdcd39dd1c1d07197f17d97d9df8bdfbde74b3851ba2685caae15e2f370484104726c352fe7262e0672bafb2cb869841947238fcab057fdf62c224e19ced12e9c5a051b6c8996b8b75520c52a6e726c70f79dcc2f744bbe9f706c7b90ba0bbab08418512b95349c7ec1bbdc0e49368fe28a205e38517e5c2d904e00453084a7943cb202468cd7719e558b6f5c529511b04278e5f7c0ad22bf32207a64ea31655e80f9bed5ad7849785c4e6315745b813525a3e541732dc58fa9fd3c3b42b010be74c86485dad9b70a353e7bbb24a3429656071bcbf05b17a4d5d58b6cfdbb02da0c519c3fd0ff3bc3", 0xf6}], 0x7, &(0x7f0000000ec0)=[@rights={0x38, 0x1, 0x1, [r1, r1, r1, r0, r1, r0, r0, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x30, 0x1, 0x1, [r1, r0, r1, r1, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x20, 0x1, 0x1, [r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}], 0x150, 0x800}], 0x2, 0x20040000) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:58 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r2, 0x3c, 0x0, @in={0x2, 0x4e24, @multicast1}}}, 0x90) 18:18:58 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:58 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x10000, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x222b}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x3c, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x64, 0x9, 0x4, 0xe1cf, 0x100000000, 0x3, 0x0, {r3, @in={{0x2, 0x4e21, @loopback}}, 0x1, 0x80000001, 0x100000001, 0x7fffffff, 0x8}}, &(0x7f00000002c0)=0xb0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000300)={0x0, 0xfffffdfd, 0x0}) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '\x00'}, 0x6) 18:18:58 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x4e2300, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:58 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x202000, 0x8) write$P9_RMKNOD(r1, &(0x7f0000000100)={0x14, 0x13, 0x2, {0x48, 0x1, 0x1}}, 0x14) getuid() mount$9p_rdma(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1004, &(0x7f0000000580)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@sq={'sq', 0x3d, 0x8}}, {@common=@nodevmap='nodevmap'}, {@sq={'sq', 0x3d, 0x1000}}, {@common=@cache_loose='cache=loose'}, {@timeout={'timeout', 0x3d, 0x5}}, {@timeout={'timeout'}}], [{@obj_user={'obj_user', 0x3d, '/dev/ion\x00'}}, {@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, ']'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}]}}) creat(&(0x7f0000000200)='./file0\x00', 0x1c4) [ 904.747074][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 904.752872][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:59 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:18:59 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x29c26d94137b06c7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x7, @loopback, 0x9}], 0x1c) 18:18:59 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x400, 0x200) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@loopback, 0x0}, &(0x7f0000000100)=0x11) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000340)=r2) 18:18:59 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x1000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x9400, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:18:59 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000180)="e6be5fbac83775521d83dfdc7cba5a2ef57d3c6525175140206393e6b64329387f741ce703460fc35f421b4acb45d7cdf83dd8a90e8684c10059c8633154b549b7d48f8cb23626d02d54502e7878b3b8730dc09eea4cc43a22fcfc0515f44aa4036ab338436ee7157e784d3cec1de74498ac1359d4b154977882883bdac003df15f617563540cbbd9dc80a05bf06ea3635a66a4dd2c9df058c9baf1d95974bf534138c") r1 = request_key(&(0x7f0000000280)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='/dev/mixer\x00', 0xfffffffffffffffc) request_key(&(0x7f00000000c0)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='/dev/mixer\x00', r1) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:18:59 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x240, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:18:59 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:18:59 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x14, 0x9, 0x3, 0x20, 0x10, r1, 0x7}, 0x2c) bind$tipc(r1, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x3}, 0x1}}, 0x10) 18:18:59 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x7fe, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @speck128, 0x3, "7a72f603cf502afa"}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4b0000, 0x0) 18:18:59 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) chmod(&(0x7f0000000000)='./file0\x00', 0x80) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={r2, 0xa03}, 0x8) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getpeername(r3, &(0x7f00000000c0)=@ax25={{0x3, @default}, [@bcast, @netrom, @rose, @bcast, @bcast, @rose, @remote, @netrom]}, &(0x7f0000000140)=0x80) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000200)={r4, 0x8001, 0x20}, 0xc) 18:18:59 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000140)='syz0\x00') getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="08000000060000cccb9c08000000000000000000"], &(0x7f0000000100)=0x14) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xa5cdf420002f28c9}) 18:19:00 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:00 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:00 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xa0000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:19:00 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x2000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xbf00, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:00 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x8) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xb) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x2, 0x2, 0x1ff}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:19:00 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:00 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x400000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f0000000000)=0x6e, 0x80800) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000180)={'nr0\x00', {0x2, 0x4e23, @multicast2}}) 18:19:00 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) ppoll(&(0x7f0000000100)=[{r0, 0x2}], 0x1, &(0x7f0000000040), &(0x7f00000000c0)={0xd4}, 0x8) 18:19:00 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:00 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x5, 0xfffffdfd, 0x0}) 18:19:01 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:01 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x80200880, 0x0) uname(&(0x7f00000000c0)=""/243) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x60}) 18:19:01 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) epoll_create1(0x80000) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:01 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x4000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xfd00, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:01 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:01 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x52, 0x200000) bind$pptp(r1, &(0x7f00000000c0)={0x18, 0x2, {0x1, @rand_addr=0x9}}, 0x1e) 18:19:01 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x40, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x90, r2, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x17}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd9}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x44004) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @local}, {0x2, 0x4e23, @remote}, {0x2, 0x4e20, @rand_addr=0x82b4}, 0x2, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000280)='ip6_vti0\x00', 0x2, 0xb00d, 0x3}) 18:19:01 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) 18:19:01 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x3, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) fcntl$getflags(r0, 0x40b) 18:19:01 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x100000000000400, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x165000, 0x0) geteuid() ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:19:02 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) prctl$PR_SET_DUMPABLE(0x4, 0x2) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f0000000040)={0x5, 0x4c, &(0x7f00000001c0)="b5958d24bc3be4de08dd3157f5e2c19bff5267d50cbd34069be9be9ef4e3c56f18d2992db383c5ecb688aaeacf04e43a4f5988f11d4ef531c7f4c4e9d2ac58823d2e0efccf627ab3535eb42740bec32430375b28873d88104c6e34d4235aa161250113a40bb54737c5860d3aa058fc8bf017967ef07716", {0x4e, 0x4, 0xff777f7f, 0x0, 0x8000, 0x0, 0xe, 0x8}}) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f0000000000)={0x40, 0x40, &(0x7f00000000c0)="d1cc2163c3765db3c0e368578beef002095641ed19e28afd3d90c12750d43e49bb9e6ac8fffe0334e71a4a226ef615da8594d44a76939c8b3a5bd832aead6ce51ea137eeaa6772bc3a579575ccccd5b4a86f777e5700548bef8cd1bc84e8627cb504d66cf08a0f4b8dc8c01936a5702058693a8554c940b67eb7c81ee4dc9bd340c7186eeb61af4860d8a359535d2b15b42b1c6fa3de62501ba3251cdf324070fb200f2873a3bccd40d85add056d1f490f48ed0a796fae65cf2af32aa9810486a9fc4506b396ef076efdbbc109225ce97c79a3a51216f9f0509fdfb5ee0babb034733d86e1e9595605f51191a4fd67eeeec6e3f96f2f54661c827d50343dae", {0x5, 0x7ff, 0x797b777f, 0x7, 0x7, 0x8, 0x0, 0x8}}) 18:19:02 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:02 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0xfffffffffffffffd, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r2 = getuid() getgroups(0x7, &(0x7f0000000140)=[0xee01, 0xffffffffffffffff, 0xee00, 0xee01, 0xffffffffffffffff, 0x0, 0xee01]) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {0x1, 0x5}, [{0x2, 0x1, r2}], {0x4, 0x2}, [{0x8, 0x2, r3}, {0x8, 0x4, r4}], {0x10, 0x4}, {0x20, 0x6}}, 0x3c, 0x1) 18:19:02 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x5000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:02 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) sched_setattr(r1, &(0x7f00000000c0)={0x30, 0x0, 0x1, 0x100, 0x6, 0xffffffff80000000, 0x3, 0xffffffffffff4f07}, 0x0) [ 908.188032][ C0] net_ratelimit: 6 callbacks suppressed [ 908.188057][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 908.200338][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 908.207036][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 908.213518][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 908.267064][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 908.272875][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xfe00, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:02 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x8, 0x2001) fsetxattr$security_smack_transmute(r0, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000140)={0xf7, 0x0, &(0x7f0000000180)}) 18:19:02 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x200000000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x0, 0xfffffdfd, 0x0}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7aa, 0x400000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) 18:19:02 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:02 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x8000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:02 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0xc0c00, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x6) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x3) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r3, &(0x7f0000000000), 0xfffffffffffffe75, 0x4040, 0x0, 0xfffffffffffffef1) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) 18:19:02 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x6647}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r2, 0x81, 0x5cef}, &(0x7f0000000380)=0xc) r3 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='mime_typeposix_acl_access\x00', 0xfffffffffffffff9) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x220200, 0x0) r5 = fcntl$getown(r0, 0x9) getgid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000140)=r5) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 908.853473][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 908.907075][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 908.912918][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:03 executing program 4: r0 = openat$ion(0xffffffffffffff9c, 0xffffffffffffffff, 0x181000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x185002, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) [ 909.147115][ C1] protocol 88fb is buggy, dev hsr_slave_0 18:19:03 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:03 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) readahead(r0, 0x6, 0x0) 18:19:03 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0xfffffffffffffffd, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x4) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffe45, 0xfffffdfd, 0x0}) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x40) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000100), 0x4) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffffffffffff, 0x40000) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xa3e3) readv(r0, &(0x7f0000000800)=[{&(0x7f0000000140)=""/84, 0x54}, {&(0x7f00000001c0)=""/238, 0xee}, {&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f00000003c0)=""/213, 0xd5}, {&(0x7f00000004c0)=""/164, 0xa4}, {&(0x7f0000000580)=""/165, 0xa5}, {&(0x7f0000000640)=""/182, 0xb6}, {&(0x7f0000000700)=""/224, 0xe0}], 0x8) ioctl$TIOCSBRK(r3, 0x5427) 18:19:03 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x407fff, 0x0) setxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x115, 0x3) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000040)={0x3, 0x103, 0x4, {0x1, 0x3, 0xe4, 0x1f}}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:03 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101c00, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x5, @rand_addr="7cc77ca7fe289cd84d1e65bf7ddf1897", 0x9}]}, &(0x7f0000000140)=0x10) getitimer(0x2, &(0x7f0000004d00)) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r2, 0x6, 0x3f, 0x1ff, 0x1f, 0x7}, 0x14) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r2, 0x9, 0x20}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000300)={r3, 0x8}, &(0x7f0000000340)=0x8) 18:19:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xff03, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:03 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 909.672482][T29489] QAT: Invalid ioctl 18:19:03 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80080, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000280)={0x5, {{0x2, 0x4e23, @local}}, 0x1, 0x4, [{{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}]}, 0x290) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) [ 909.702302][T29489] QAT: Invalid ioctl 18:19:03 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x9000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:04 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x8000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x80) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000040)=0x8, 0x4) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x1a, 0x0, &(0x7f0000000100)}) 18:19:04 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x1, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x2b6, 0xfffffdfd, 0x0}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x3fffe, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xf}}, 0x388) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x4, @mcast1, 0x12000}, r2}}, 0x30) 18:19:04 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e24, @empty}}, 0x24) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x112800}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0xe0, r2, 0x328, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x204000000000}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x14}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x2c}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x81}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10001}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3a7}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20000884}, 0x4000005) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:04 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:04 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x101002, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000000c0)=""/167) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000000)={0x34, 0x0, &(0x7f0000000040)}) 18:19:04 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0xfffffffffffffc51, 0xfffffdfd, 0x0}) 18:19:04 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xa000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:04 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000000c0)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r3 = socket$rxrpc(0x21, 0x2, 0x0) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000100)='veth1_to_bridge\x00') 18:19:04 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x20000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) 18:19:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x40000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:04 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:04 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x200000) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)={0x5, 0x7fffffff}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x1, 0x2, 0x1c5, 0x0, 0x8}) 18:19:04 executing program 4: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x2, 0x509201) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000100)="e8dfcf8479d168c669cf1272317801160ec9fb2c0e5f39d4f6fcae8cc1425a05c2adc8e345593c74d2f217048d9544d2b05cdf2d95193871bf38379e5888b52c5dca363453c4acbfbd7df92baf5e0b8e571318f8670473b3098f270408734c1e2b88ef90a579dedab656fb0e9e1b84a9c56f5f819da5bddcf9e919f7470b68158980ddf5f5da242ed5b4d89e956dcde2ebf483634d4a645d0fe8049fd98e6f73a1a7af132c6c3ecc6ce238b2452a273346", 0xb1) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40600) write$UHID_INPUT(r2, &(0x7f0000000280)={0x8, "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", 0x1000}, 0x1006) inotify_init1(0x80000) 18:19:04 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2000, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000000c0)={{0x9, 0x0, 0x6, 0x1ff}, 'syz1\x00', 0x21}) write$uinput_user_dev(r1, &(0x7f0000000280)={'syz0\x00', {0x9, 0x0, 0xe4cd, 0xfffffffffffffbff}, 0x25, [0x0, 0x2, 0x0, 0xfff, 0x0, 0x80, 0x800, 0x9, 0x4, 0x80000000, 0x3, 0x6ee, 0x7, 0x1a1f, 0x5, 0x6, 0x2, 0x800, 0x8001, 0x7, 0x2, 0x0, 0x401, 0x8001, 0x5, 0x1ff, 0x0, 0x67, 0x80, 0x400, 0x2, 0x2, 0x3, 0x0, 0x5, 0xb1, 0x5, 0x9, 0x1, 0xffffffff, 0x200800000, 0x7fff, 0x6, 0x4, 0x3, 0x7423, 0xf4, 0x9, 0x2, 0xff, 0x5, 0x1000, 0x5, 0x7, 0x1, 0x7, 0x8000, 0x5, 0x10000, 0x6, 0x2, 0x1000, 0x4, 0x257], [0x7c22, 0x81, 0x1590000000000000, 0x8, 0x8001, 0xffffffffffffff7a, 0x6, 0x7, 0x7fff, 0x8, 0x80000001, 0xffffffffe2aa4960, 0x0, 0x168, 0x3, 0x3ff, 0x7, 0x0, 0x9, 0x5, 0x100, 0xffffffff, 0x9, 0x6, 0x400, 0x400, 0x5, 0x9, 0x4, 0x0, 0x5ba3bc2f, 0xb844, 0x5, 0x3, 0x5, 0x6, 0x21e, 0x3, 0x7c4d9676, 0xbf2, 0x400, 0x8, 0x1000, 0x8, 0x8, 0x1000, 0x8001, 0x6, 0xb54d, 0x7, 0x6, 0x7, 0x4, 0xffff, 0x100000001, 0x7f, 0x7, 0x5, 0x40, 0x3ff, 0xfffffffffffffe01, 0x4, 0x6, 0x6], [0x3, 0x7, 0x80, 0x8, 0x4, 0x3, 0x800, 0x2, 0x7, 0x7b, 0x80000001, 0x400, 0x7f, 0x401, 0x97c7, 0x2, 0x8, 0xc1b, 0xfffffffffffffffc, 0x1, 0x7fffffff, 0x15b, 0x7, 0xff, 0x10001, 0x3, 0x7, 0x8, 0xde, 0x8000, 0x67e, 0x4, 0x5, 0x8, 0x6, 0x80000000, 0x4, 0x5, 0x3e82, 0x101, 0x3, 0x9, 0x2, 0x7, 0x0, 0x80, 0x9, 0x81, 0x1, 0x6, 0x80000001, 0x1ff, 0x2, 0xf66, 0x401, 0x8c, 0x8, 0x1f, 0x8114, 0x52, 0x4, 0x400, 0x7fffffff, 0x9], [0x80, 0xbf4, 0xb1e, 0x1, 0x0, 0xd6, 0x5, 0x2, 0x7, 0x100, 0x5a2d, 0x9, 0x72, 0x4, 0x7ff, 0x4, 0x7fffffff, 0x60, 0xfffffffffffffff7, 0x7fffffff, 0x7df788f6, 0xfffffffffffffffb, 0x0, 0x80, 0xf8b0, 0x7fff, 0x2, 0xa20000000000000, 0x9, 0xfffffffffffffbff, 0x1, 0x3f, 0x8, 0x0, 0x400, 0x9, 0x81, 0x9, 0xfffffffffffffffd, 0x4, 0x0, 0x7fff, 0x2, 0x3, 0x9, 0x0, 0x4, 0x1f, 0x9, 0x38b6, 0x73, 0x5, 0x3ff, 0xffffffffffffe87d, 0xb69, 0x1f, 0x80000001, 0x3, 0x2, 0x10001, 0x6, 0x0, 0x9, 0x400]}, 0x45c) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x36, 0x8000) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:05 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xb000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:05 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:05 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000000c0)={0x7d, 0x0, [0x3, 0x0, 0x1, 0x1]}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:05 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x5, 0x40) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffff9c, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x2, {0xa, 0x4e23, 0x80, @mcast1, 0x3ff}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40001, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:19:05 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xc000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:05 executing program 4: openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000100)={0x9, 0x4}) socket$pptp(0x18, 0x1, 0x2) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x402) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000040)={{0x33, @dev={0xac, 0x14, 0x14, 0x1d}, 0x4e24, 0x1, 'lblc\x00', 0x2, 0x40, 0x67}, {@multicast1, 0x4e20, 0x4, 0x8000, 0x1, 0xffffffffffff0001}}, 0x44) 18:19:05 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x20000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x10080) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e24, 0xe3000000000000, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0xfffffffffffffffb}}, 0x0, 0xa6d7, 0x0, "f9561fcfddead55143ee3a073b7f1eb6a13878c3875778b4beb06a3a0108b245a91762cd21f078ea44e268439f3c32e8a403e591ba50970f069e6e0b28d430d0b396b2f6a654d7d3e3af20debd2215d3"}, 0xd8) bind$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x1, 0x2, 0x7, 0x8, 0x7d, "cf8d6b49ca0b3beb083a85edd5e7acecf7dc60b91c4476272848d16702eafa6fec2be1b2ed55dde73439611a009a5dd14eafccad9235d424512899de60142d", 0x22}, 0x60) fchdir(r0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x6) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000300)={r2, 0x1000, "d5c5c3cc7c0545f094ff69c1f50e9e2cf291592d2f2076e695125659120fdf7baa4293e98f66b7f9b3550a0fe0d8376576e79f06a906065fbfcec7cea398fb7ce4225d1bb59dd5fffc9bd09e86bb5ab3c2111bdcf4cf9ff6fa9c33cdbe31f899d53542358ce9cc6bf3943db75d37f979c297adc4353a9b8a13f852d48234574a55a6fc555d9cef17ae61da4e66b37c156d87171b845c171b7dddf52491ee3b80ba16e7e3aa4f10fd8b18a99127afb15341a74d57bc7e5f36f8944dc2df8df96be55c83f4596a92666ee820ea87a35daa5569e3c576b8115a3516c90af164be642e886a127ad83d2ec8064c39593157ea54f258e06f12eab13bf4e587967f13304b699fafc836fff0fc859a79803c34a1c1b03b431a168bd28a4e5262604972824c1ae0c6c9c2403095dce48767a188dd3bd5b5e26f7513336383684838a685629b9a32a6a7bcf726b69fe3903d5e21d4a0b31cbb87ecca78495f39388c943e3af31fc5665452ed4b8a0cfd59c61450c777bf0a93787b24d4a673b3f35996b0bd011a0f6282e6a4d68c1cab987d9996246c451fe79a3f0433b7eb93c3f269980dd0be1e272223ca2243510ec6d728a131260feebac75970efbbae2e7d7566641e2fe5875040b381299c3879e511028bb39924737ca0550e9456b9100a9633bfd910e057cccdc60d76ba345f43e5b0898ef199d2351db5c446684df32121061e4ec6b4ab7425e53913f90c5ce87191eeff5b2d1b8c05a61e342a5d9f9a13dd0d82508d5dce78ef3bddfa242cb3778d9fc4d8c5a62b2b471b871413d84b66e3793a341874837cabdb1bcb59b45bf2a0b1f55a232c291e240082b361e5ee10acaaf799647f98c0ccdc5f77b2202e462ac131cc4c4cf487cb39825ee0661068a58ffa090aa89af93074d829b08293cb91fc26a4a020b968884664a453ea4f3079167b47c960d4856f3f00ce87891a7e4d1d5a1feb9a13f7c11ac5bf771fccf7cfc1766669447ba493c46383f8658cb56fe026b5ddaabd8bdb3e9522ef0cfc1a684de059967ad018906cbcf6310776bd12492c6028fcdc28e5e18b54af58f032213044a4d87d7c852eb34f5f12de1bd1d35960f6140b68f3841c31a747cf3b756afcd45cdf2175f7980c8c1c4a47273e718863ec3452d386894970f4c42e1d1835f1cd4d43d720046876e48d614d327dbecdcd2c8cf9e495675c170fb1e04bda05d0fd5ef9d2f5601d14fd074dda662a454d6ba7d5a79aaf4c9e67adca158077b9ad0d4bac1315b7c7fbce5e4368cdb1f183cad0bfec180f0d63d85c92f9bb3a51f397c1d747c8765faffc0487e428ad524db62e6384e8c04fe7885f07c016aebd87117ae452ef66e40da4d2bdd0e6e14897383671fcbdf6c9686bd736ecbf22652ce140c53f2ca330b1cab1cd878a96b18db926787d140f1dc324a78af4fae0552019eb7f501e00f20825dd62762f19d4525753929344d6f61d6ffe8d90548235f189467e644c1b75aeb969212ce03e011d96f9cf5cc2ca062c63462d54de5bfd4a98444300209a940004a4530814cea1c4e3671f78f5d6c9afde3281836e389c0d9481d8011ec9ce7a56246c9951dcc9042c2a7a86d79b7f513e5ba7e8ee4438c89ef905a32089ea29998cd97d8c0e177d85d3f1d83e5dd24e0fe2378fcfb12a2bb7e3454369c4eb282f3110edeb5beb464ebaee0165ed77e2625dea75f4d45849e71aaefb45b49daf5e3b7f3506406fee545ec7d9d9ba9f676c8538cd388c7043a143de0bf6ed6ba1921c59cab8501e8cd182617ea8b5ea95561d9c1cb803ac2cd483874d02844e1d92ac31a47247fdb04005859347df1ab8c79cfc2f6effda4bb9c0980d37d89b5aa067631945c4625ca767f03bf027590ad0a8761e47498ce1772c739f745237c222944ea312f1a42aabc1402028057b2054b4fc443a35fee668bbe49cfe238a180ef0119c544292fc03a88d40f5a3e600229df3a80fbcd89e610b4cef7e6fa70b6e89a3cf265fcc9bb4d24cd92aaad35a1d5dbbf796c200e4cac8ab12dca7d3b7dc702f690c8d7ef85844dc29d8d0200337e0125cc7f02ce9a4488ce361830174eab03850a03922c4f1bcc248ab9153055d285100adc0ee7d390071dd90a1b66ec6afed067f2a0f3b13612ff71b035143fd241514040944b64da8c92af50864e699dd02c5ca0b50625b37086f0e526cd77c9a6c475330cf0e2b245875f92cedbf8a846de311b69613812abd560400400631d754233cabf0439c6da61ddf20d924bb9d3000b4f8d64608f0aa88af91165b69ac8849836812be152a115e201b0da0fdb72a2c5d0e88563afb4e2873f440f9169c81651e89341b43820cd95b6a519f6a44cad3e610d96e9731670fb9849c0b529bde822a24a965dff8d36c73bfaad7fe7165cfc53886e34bea41a0e9a557b2e95df39ea1a89a127a3046fbf2a74b7727a479633890f558141fcf647ee0d540d091982694d801c1bdf65fe2d195bbed9136a6dd0fc53d73512bd9b03a63f0c650fd3ebcb7aa55c71e58a498bb062b80750e110170f04f92703ba92f176cebc7448353f69a2254377d0a334d24ab02cb13fcd07288c31e246cf2fe313098935944c352a56f82f937565f35b4436fa2d2228aa10c735b37c2c6feeb4fd3c9b52f4258bae9046025abc98f3ead0cfeafa8079a51fb91811952c49bbd593e3ad3d53dfae7982b385a4117d20986010e4fe1617ab6c62981e6db8233bdfd01b5752148e062111c73f2519b0bd1dc61f047bf9fa13ff073cf4f55261f18fb72efdfff8bfbb5a005c41eef9f308740c473be65a2fafa48e033a59eba07703b9ed9a76e151a4c881f112e5764610e4ed426ec44ca7361bf856173b6940ad0898da5f0d94a4c2e3da00fa9083cfc3db5580e1acc3780664b4a35a2ad0bfb817c69dc096360886ad8f29cd9f4dbfd1f0bb219e1d5777cd4f430bde646f43f53dedf78b05ff364fd7d3376405825decf8ed3e607590832c9d1cf7ebd0d98865750b795b39ff7389fa615b711856a8f29e15838b04f0d441d84f454c380e3d1ff4c0079d62b4273e2a42b618f44771c10b7852bfa5d59aaddf84ec24bdb6bd5290d86411480b9b59df2711ac5834829519d1ddbd930bf78e11609f3b9fa424694816e784cb16c27ebc358858d6580387e38168090dcb6b52813af8d1b58eaee59fa35056cd502236018d2144fe821c7e1cca5ef7811b2dfee3399f980c688cb70c8d370313fe0a8f58ce42fc653ae67774348377cef4ab01cf47526f3f5f37e9d265aafc004292b1e08f4e5481cde52f77424b5533107daeba269e7f5ed13aa629eeb8759b1670fa368cc327ea43c532225749b6542969a420c4270ea9283fe8f0af1c3ad585647ef807b2546dc663c1f1257e31529ae08390f96644a82c114be404d43fff4d3613ab7a7488c418b171f23f80244e92813e66b674985fc37754e405018843e20ab504c7a48f9a23ba1896c7d2814370a5bc1114ea9dc8b8134792467d30a1c897a61e5772e9f828a80f4a17f1d21534cbd227c4472d751003e91bc73e955cdd79d4e534b09cf332bf4745a0884e7ce4fb8ea8a9ab8efd21cdfc4e2821a11c0f214f00ba68b4b1bd15aa7d2b81a30d1e01f99695b3385ed73c663e933283607ea005122b8931692267bbe629a191563ff2373fe3c998303244e8d964dcb23684c54630bb3983f594e22f936c5d8cb2325c8cf28ca40e813ae0dddafca6474b08fc4d8e21bec79268ec0b3e7180c8fe4d8bd9339b61ed351d8e7b989ee614776b118e12bac6f592680e01f70592e187771a7556b748d8e8181def6ff9ba961384e259019e1a8a1aadb0603212757728d70e97d20cb3856922892f1400131c80b6faa01d7c9602e471aab15d15c17231860a6fe553a3baf825489ccf41a554963c72e614eddd4b64e6e11f516e86d47af78b4969d1697e43a085402fb9c1d04a083edab5ca55f3b38fb6d7ce2bd5c4bd039d32afafe5f868d6265db164a05cb9cf9cbe2f2efe9990526f1ff796ac304edbd121301b0d4ec00807f75f36706ee1787603c45128b81a5cb051b3385c6ddd6483a87fd05335ec824beeacca7f717abcc1b54b3589093967b255026e74653bf60acb84d090ee26da42ce70e96d910b90ff6c6871efe3ab1a4d05cdd3e42924e519dbb4b13a25d6cd1e27f0af8b3e08087140f229df331cbd4a3036a9a00ebf7d29131d38acb3a25a96a11f5e4d4afc9d55f6af8451115bcce48a44924175a7614a8ba983b14e3f05bd9eb63145c0cf6799b5da59ec77c3a9974adc4f75e3f7177ad99c99863d0edc4bc52452f6dac685ac80011e50f3920db91c17f24b0540ffb45fff90582ebbd6c7591e3b6c878d54a9ab8a1289de2100d56065a336b58175a1c482664c73b9a43b7ae7362bf91db8b0b665e0a7f0718f4f5d97e784ed53ecf71ead7fd025d9e848fe89e4e9787cfea38462d88504f3022cc90a2e6d8c8f7cb6585b0e7dd7e075dde0f844e1e4e3ebfb2ce71e11fa108e8628e8127ab3c0fdd83f40221a2025e003166aaa962aadea3b5a86fe352fbac8eca1944e2c4d70648563dda628607e0d8b253cdcf0fb07abcab744dc004f1c9e55c512a0174b98786689920161963eda488d193aa6b8e0c8ff5d46708953a63d07b4945912dd37e9dcf06d2332d48fd199073486d58968e9707c77b71390eacf4c7dd7a9da1fb1c52d8e8cc4a3ca162b2cdd2c3b0edbcc3bafd1cc85a34c905688246eefbdae1d97b49f0f2ddd820379ada4b21b07dcf1f46bb6a26fa1b16a9ab39ce97e0aa6e099021a87df6efba0f6df7f0759b7cef592b7acd9037393a590b0072a6fa9a67c0a21533448d0fddb296fee3dba8b274c1c3ad58749980e3a4f95d577947530b0b51d3b37e45ce2022875e56f68815c3c36f1ac9078da347cd641c65ec708738f3192ab2ada3421a206a7996c13bfa70a3219d0a966af61d820629d83b1422ce112674f87d5ca37196f5cd6be803122ec97e4cf0b71f51ca07bd006610d53cbadfa94b41e80965020c46508542f972ad5a93adf2a4c565f81da11dfa0d495950691fc8db5146ab5eb71605bcc24f4d6ad07cbcd12edd5ff870aa5716f6db0b63d06c749558dd3d2425de54e55b4a07d05a74d9ef8eb95913baab479f427fefef46cde0840289cb08da65fe7ffd048c12c9d191338e8c2f0f95a12f761526ef8cea9e2b74d31222f6a7cf9de4286f736fb25b5bb75be26f20ea099d59174600cacedd0cd4bc3bd41b275ca7d0ba39d82f9617b832befe4ce6151861dcce445d5392345af1c609eb41cb5c4dbab483f856232b5f583afdf3733dedfb1b7d9903f23b09a74ef174e9fe7a6116ad275962618ec4f5e5d99dfdac5af9834f92943f220c4c724f115921b0cb3923ab1073801b5d9452ba243a041191d660946806d078f6b1d087552acc45d1cff5eac91dfad40c1493169c5538744414682fbe3708d5f13915dde748404d9cf87ceac0626917f3c641db9dee18a1f5a0289977891e866e2a7aab22bb01572c4a1e900d9b157d864e945bf63c9878fda143781d9effa964a1ba5d7dca2e91c26373f22702e3b346e7bbf4ce07dc285f2a158cdf03504ceafc4c4d943403a6bac554be09941520108a4732cfd7517dc7602a3fb165a8e2bfb8c03528aeb85c540c08d7774b33b67f0d02ea280044454ccccff3b44eeab8f9385ea4e54adba50a3bd0d6c32f0ec4b5e9611be772578df7d8b990f57a656eb26178742ba7bd2033b84f79d7a8570392261579dcb4a1ee15e7"}, &(0x7f0000001340)=0x1008) 18:19:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x1000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:05 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:05 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000040)={0x0, 0xfffffdfd, 0x0}) 18:19:05 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') 18:19:06 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) socketpair(0x2, 0x80007, 0x1bc5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000018}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x210, r2, 0x110, 0x81, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81f}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffffffffffffc}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xe2, @empty, 0xfffffffffffffffc}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb437}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x371}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x827}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3c48}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1a630ab8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x487}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4859}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0x703}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x4, @local, 0x60fd}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x4000840}, 0x4048000) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0xffffffffffffff95, 0xfffffdfd, 0x0}) 18:19:06 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x4000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffeed, 0x0, &(0x7f0000000040)}) shmget(0x0, 0x3000, 0x2, &(0x7f0000ffb000/0x3000)=nil) 18:19:06 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:06 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x1d}) 18:19:06 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x80ffffff, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:06 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x500, 0x80) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xff, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r2, 0xdee}, 0x8) 18:19:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4000000000001, 0x800000000000000c, 0x40000800209ea0, 0x8200000001}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080)="8d", 0x0, 0x1}, 0x20) ioctl(r1, 0x2000001000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77ffff, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 18:19:06 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000180)={0x6, 0x3, @stop_pts=0x100000000}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8000, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000040)={0x5}, 0x4) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x49, 0xfffffdfd, 0x0}) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000140)) 18:19:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x2000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:07 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:07 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x200, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x595aa75f, "4c77ce5e346d843baa7136484e27ef9aa497ff8ed4fb7834b029d6d41c1abf3b", 0xa12, 0x2, 0x6, 0x15, 0x7}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x50}, 0x800) 18:19:07 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x80000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:07 executing program 4: socketpair$unix(0x1, 0x100200000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x0, 0x0, 0xfffffffffffffe4c) [ 913.307074][ C1] net_ratelimit: 19 callbacks suppressed [ 913.307081][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 913.318607][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:07 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x3000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:07 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:07 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x81000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:07 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="31e5058271a2d41e6ac1bb09d3d75208d32141ccea8054767f9819ec0e09531bc1e055a8b9c32c5d41faa77fdee046db2fc88de4d4db670c610c8053d2245790067e14e69fec12cda9a1945a2aa0fe75d4aa7f6c6ca8a453bba0072384767e4fbfdb00df8a34021e7d61a5da12ee7984ea654bf5617c32bacbc064622a69e95372d471ed9c2b2c865cf5054a51851782617d101f92bcf5c8e50ce0f6fb7f5f9fcb978fd723a7d1818526dd06f9384bce2e22aafd705737fc1c988f1bb49ccc863cf79a9f356a36359c5d63d8094e1498bde5a0d8bc37f3f8d0b7cfba", 0xdc) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 18:19:07 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x2) 18:19:07 executing program 4: gettid() mount$9p_rdma(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) getpid() clock_gettime(0x0, 0x0) futimesat(0xffffffffffffffff, 0xfffffffffffffffd, 0x0) 18:19:07 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:07 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f00000003c0)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x1ff, 0x0) execve(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) 18:19:08 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400000) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0xf9d6, 0x4) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0x0, 0xfffffdfd, 0x0}) [ 914.084621][T29737] overlayfs: failed to resolve './file1': -2 18:19:08 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x4400, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x0, 0x80004) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000500)='\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, r3, 0x0, 0x1) tkill(r3, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000400)={r4, 0x68, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x2f8fb770, @local, 0x9}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000440)=0x10) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000200)="b37b929ecfb47d246eb390c01edf054a6ad56a3e8bbe120cc9b25a3faeb18a4e0f9d51de4a9fe7a5656db28693beaeb79356c4b5718eea14db8f0d1f18d5044cd14171c6388b2b0af59e820fe2137ce16e14a5e3a0e5583c56711e895fa04e4e7005", 0x62) bpf$MAP_CREATE(0x2, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1b53) pkey_alloc(0x0, 0x2) r5 = socket(0x2, 0x80805, 0x0) syz_mount_image$nfs(&(0x7f0000000480)='nfs\x00', &(0x7f00000004c0)='./file1\x00', 0x4b21, 0x1, &(0x7f00000028c0)=[{&(0x7f0000002800)="e4b2a601ab55940beabcef4099661174bced812d675bf6666794452e047c4f8a73ce05403939f35e8476a832920cd357c501b35e7aa193ba723cdb71f4959d67a4b124b34247e136f8ec5267004ad71a", 0x50, 0x4}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x300, r5, &(0x7f0000000000)={0x30000010}) 18:19:08 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r2) 18:19:08 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 914.427072][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 914.433057][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 914.439008][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 914.444874][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 914.507128][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 914.512954][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x4000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:08 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000000c0)={0xffff, 0x3, 0x4, 0x120e000, {}, {0x3, 0x0, 0x6, 0x7f, 0x7ff, 0x3, "2942de0d"}, 0x80000000, 0x3, @planes=&(0x7f0000000040)={0xffffffff, 0x32, @userptr, 0x1}, 0x4}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:08 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x81ffffff, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:08 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:19:08 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x400000, 0x8) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) 18:19:09 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x4400, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x0, 0x80004) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000500)='\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, r3, 0x0, 0x1) tkill(r3, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000400)={r4, 0x68, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x2f8fb770, @local, 0x9}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000440)=0x10) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000200)="b37b929ecfb47d246eb390c01edf054a6ad56a3e8bbe120cc9b25a3faeb18a4e0f9d51de4a9fe7a5656db28693beaeb79356c4b5718eea14db8f0d1f18d5044cd14171c6388b2b0af59e820fe2137ce16e14a5e3a0e5583c56711e895fa04e4e7005", 0x62) bpf$MAP_CREATE(0x2, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1b53) pkey_alloc(0x0, 0x2) r5 = socket(0x2, 0x80805, 0x0) syz_mount_image$nfs(&(0x7f0000000480)='nfs\x00', &(0x7f00000004c0)='./file1\x00', 0x4b21, 0x1, &(0x7f00000028c0)=[{&(0x7f0000002800)="e4b2a601ab55940beabcef4099661174bced812d675bf6666794452e047c4f8a73ce05403939f35e8476a832920cd357c501b35e7aa193ba723cdb71f4959d67a4b124b34247e136f8ec5267004ad71a", 0x50, 0x4}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x300, r5, &(0x7f0000000000)={0x30000010}) 18:19:09 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x1, 0x0) r1 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000000c0)='[eth1\x00', 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000280)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="e22a9d5898f91e7bc03f62545786703b756b2a1b7c0adec4a98a46e37fccc74a7c9a4e1f913352f65d112e2a33872c30a584b9b1fa79617c319c9fc76dc0fcfc6390fcd55f015b63462d7ede4fd97425626f0a8549294491b3f491d1b1c0706791907011c710ee072c8ceafc7914f5ba9ecbd16e718978de94cfe6ac48de0c5115253792cac38410f4f06d0880846b64f1f65a570a42134ff18d727dd49e5078f32848dc6d8c70dc8deef2205bf942644b032e6923a76701e4ddb078a715da35ca9c99d92860b3b6c1cb08025abcc69e16e7f165ac39a0932f240720899f7e31d7edfe9653cd513ea289e3243c7c12", 0xef, 0xfffffffffffffff8) unshare(0x2dc721a4aea0ea6d) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000200)=[{&(0x7f0000000100)="a0551b025a9b69f2145237359d6fb15fda4aefa870c5b09963478bfa8a72145dd612ff89d58dad694e64aff2983060f8257de866a2ab6df2b7a1668333e843a771c6ff6f49ea4af51ad1227dc1962337ac7f51ad4c26561b204890038797a1aa733ef4eae078350e7839035354f775cd28a53a1d25619f92fc36789325ebbd1a699f934644351fc8af6c6d27cabd291ddbf4699d5b2438ecca23640cc13725dba8df94cd705f23d17a8e2c7f2a52518de123bc551e22ec07e0c93c9b783725f8897733f1e7eff1ddca26763a7e8aecde9365831b449a99462d681989587111ca32dd1b50a2e13409137e", 0xea}], 0x1, r2) r3 = accept(0xffffffffffffffff, &(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000480)=0x80) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f00000004c0)={@mcast2}, &(0x7f0000000500)=0x14) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000580)={0x0, 0xfffffdfd, 0x0}) 18:19:09 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x92ffffff, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 915.147081][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 915.152917][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:09 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) ioctl$sock_proto_private(r0, 0x89e5, &(0x7f00000000c0)="a36f9bf1960defc46d40f35ca2f29c2f310810932c4c2a627be4c7a5ae37c14de2767b926c3ec58f1ee656ccf8e39ed5b5a6ce7082d58c75a079d42a2afa247c3671d9d3ab2bf15d1c925dde8af286bbc1b78de2c6bfe84593c54ac69e04b0a7880d3fa06c82505e85939432f1ba49117422d19b58204be9ae03a0ec2d20d681df66052627bb5b589b4c60848b98f7bafccfb74d64bfbf46e1435b256111f66e1a97f2818061b5fe5cccb47281992dee1f2d12a191d22f76c143638a7ad39d70a15fe6f910697befb74880dd685787e056f11dfd95e6c272a653f55aeb86e491bc4189d03572") sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0xc0000, 0x0) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f00000001c0)="dd3ccbad2605c4f2780648652f975b706680b746b978ec9060f397a7fdca0359d8002e1f5f10a1ae1a996e6a14d79751465a60cf72546e3c307fd2f0069c4f332b855e6baab450", 0x47) 18:19:09 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x2, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0xfffffdfd, 0x0}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80000001, 0x400000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000700)={0x0, 0x1}, &(0x7f0000000740)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000780)={r3, @in={{0x2, 0x4e24, @remote}}, 0xffff, 0x200, 0x100000000, 0x7, 0x80}, 0x98) sendmsg$netlink(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)=[{&(0x7f0000000280)={0x154, 0x28, 0x8, 0x70bd29, 0x25dfdbfe, "", [@nested={0xe8, 0x9, [@typed={0x8, 0x88, @u32=0xffffffffffffff80}, @generic="a79c14189960a4e949273cc5871aa065c54d", @typed={0x10, 0xf, @str='/dev/dsp#\x00'}, @generic="b5ed00dc12b97f7a199cb369e7a10e7ffbe1cdf94a568782e40da8c509459831b3bbc30de275e45004576719aa924c6e68c412725a7641a93de3d300b0e57e02a68b7e59f5b96d392c547724bcba022efc562490952985b5816e83196b01db45a6e6369de3be94c083ba99a4feb542c1e6b58bcc9aa25e9da8844a97daee53ae0576f779f25bd57f23fae95a3f4e84afcb52ef06da12dae30fbf65d52e683c4b201ab19cf03ddfacd32e5d4c5ba9a0d551134bd4facb", @typed={0x4, 0x95}]}, @nested={0x18, 0xf, [@typed={0x14, 0x7e, @ipv6=@rand_addr="b2474aacc1af69c640d08afc1130a3de"}]}, @typed={0x8, 0x66, @ipv4=@broadcast}, @typed={0x14, 0x21, @ipv6=@ipv4={[], [], @remote}}, @generic="024661905d6d89b169cce708835846c03053d3fde204947051d98801f5780c4a49e9019f085f4d"]}, 0x154}, {&(0x7f0000000400)={0x1b0, 0x32, 0x400, 0x70bd26, 0x25dfdbff, "", [@generic="355ef29379f7f5de56", @typed={0x14, 0x90, @ipv6=@empty}, @nested={0x60, 0x5f, [@typed={0x4, 0x3}, @generic="ef30ea3b51eab72d2e5246a92273976c61f6818578b73afef55d1f0f66e306326dd16954492ab1a2f2ebfbd1c1f7e0ae29173b45c341d81d8d74cd3a02f0be64f753dbfde1860bfc2a14f44b724ed0cf4dccc64bd9"]}, @generic="9a5561870dba4aa3959b79902c40db6a03b6e5634c62659c931df8fbde8c21b636c67b1d1d5e7f9982a2f3d8aef60b56d249972c9f0ec923fd857c1c48a208ecd65b9ca8ed0347ecc73688724b7a98b7ae3d10b2c82a662f1a6fefc2fab1143263362ee352dbc1a94d3576564ee6aabd495ccb5dba1fe12cb223d32ca2d3c5063a9b8ce53cf174eac60d1ae7fe39634a2ee5f6bb683d21de9c25541d647d1718c07f3a0715535b570380a524b4955fc4ba5afc2ccef3e66459469803e5e4362596f364b90499b541aa45ca82365e353ca580dc780420503f5fc1488d11042ce09f49108b67eb7c96", @nested={0x38, 0x16, [@generic="c0847ee7b1ec80fb97c8cde3e09fc0e514ad6d77d2175e26c7935aee10", @typed={0x4, 0x15}, @typed={0x8, 0x1a, @fd=r0}, @typed={0x8, 0x16, @uid=r2}]}]}, 0x1b0}, {&(0x7f00000005c0)={0xfc, 0x42, 0x200, 0x70bd2b, 0x25dfdbff, "", [@generic="6d5bae3623ac1812087e281876641bb17264775503ee333f13f5b9f9d586fb841a356c6668c0c327b8b4fd9df7fd7df2d882f1d22820c28e2b9e82d25750bf84b4e641e7a375a5260f3c3b04e33095a5f7ed7f0d91ccc983f016f263b751e4d5c914cc15f204fd82ad57bcc10f4924e4ae4cb80c65342b9185f358ac1fb47b2975c9d72d3283d6601a69a3d9e0133e2496aac8ca4dac130d5f3c09f0938e43eb1d43cbbc57e260286d311573afd2ec3e6ab3c5f61f2a8ac2347d810f64f957901560c689b80e20b3bd809afd9b30e5cefe811db777312867e31e0d6660e798450f036356e1a48a7908ccbe"]}, 0xfc}], 0x3, &(0x7f00000001c0)=[@rights={0x20, 0x1, 0x1, [r0, r1, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r1, r0, r0]}], 0x48, 0x20004001}, 0x4040) connect$caif(r1, &(0x7f0000000040)=@dgm={0x25, 0x5, 0x1}, 0x18) 18:19:09 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:09 executing program 1: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000080)) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0xfffe, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x4b, 0x3f, 0x6, 0xffff, 0x15, 0x2}) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score\x00') setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000200)={0x0, 0x1f, 0x7, 0x8}, 0x8) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000180)={0xa, {0xfffffffffffffffb, 0x6, 0x0, 0xffffffffffffffff}, {0x235, 0x1, 0x80000000, 0x55}, {0x7fffffff, 0x1}}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0xffffffffffffff33, 0xfffffdfd, 0x0}) syncfs(r0) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x7, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140)=@int=0x3ff, 0x4) 18:19:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x5000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:09 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x93ffffff, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x4400, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x0, 0x80004) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000500)='\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, r3, 0x0, 0x1) tkill(r3, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000400)={r4, 0x68, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x2f8fb770, @local, 0x9}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000440)=0x10) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000200)="b37b929ecfb47d246eb390c01edf054a6ad56a3e8bbe120cc9b25a3faeb18a4e0f9d51de4a9fe7a5656db28693beaeb79356c4b5718eea14db8f0d1f18d5044cd14171c6388b2b0af59e820fe2137ce16e14a5e3a0e5583c56711e895fa04e4e7005", 0x62) bpf$MAP_CREATE(0x2, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1b53) pkey_alloc(0x0, 0x2) r5 = socket(0x2, 0x80805, 0x0) syz_mount_image$nfs(&(0x7f0000000480)='nfs\x00', &(0x7f00000004c0)='./file1\x00', 0x4b21, 0x1, &(0x7f00000028c0)=[{&(0x7f0000002800)="e4b2a601ab55940beabcef4099661174bced812d675bf6666794452e047c4f8a73ce05403939f35e8476a832920cd357c501b35e7aa193ba723cdb71f4959d67a4b124b34247e136f8ec5267004ad71a", 0x50, 0x4}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x300, r5, &(0x7f0000000000)={0x30000010}) 18:19:09 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:19:10 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x94000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:12 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x4400, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x0, 0x80004) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000500)='\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, r3, 0x0, 0x1) tkill(r3, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000400)={r4, 0x68, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x2f8fb770, @local, 0x9}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000440)=0x10) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000200)="b37b929ecfb47d246eb390c01edf054a6ad56a3e8bbe120cc9b25a3faeb18a4e0f9d51de4a9fe7a5656db28693beaeb79356c4b5718eea14db8f0d1f18d5044cd14171c6388b2b0af59e820fe2137ce16e14a5e3a0e5583c56711e895fa04e4e7005", 0x62) bpf$MAP_CREATE(0x2, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1b53) pkey_alloc(0x0, 0x2) r5 = socket(0x2, 0x80805, 0x0) syz_mount_image$nfs(&(0x7f0000000480)='nfs\x00', &(0x7f00000004c0)='./file1\x00', 0x4b21, 0x1, &(0x7f00000028c0)=[{&(0x7f0000002800)="e4b2a601ab55940beabcef4099661174bced812d675bf6666794452e047c4f8a73ce05403939f35e8476a832920cd357c501b35e7aa193ba723cdb71f4959d67a4b124b34247e136f8ec5267004ad71a", 0x50, 0x4}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x300, r5, &(0x7f0000000000)={0x30000010}) 18:19:12 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:12 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x94ffffff, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:12 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)={0x0, 0x8001, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:19:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x8000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 918.587454][ C0] net_ratelimit: 6 callbacks suppressed [ 918.587478][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 918.599384][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 918.606231][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 918.612462][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 918.667966][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 918.674379][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x4400, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x0, 0x80004) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000500)='\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, r3, 0x0, 0x1) tkill(r3, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000400)={r4, 0x68, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x2f8fb770, @local, 0x9}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000440)=0x10) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000200)="b37b929ecfb47d246eb390c01edf054a6ad56a3e8bbe120cc9b25a3faeb18a4e0f9d51de4a9fe7a5656db28693beaeb79356c4b5718eea14db8f0d1f18d5044cd14171c6388b2b0af59e820fe2137ce16e14a5e3a0e5583c56711e895fa04e4e7005", 0x62) bpf$MAP_CREATE(0x2, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1b53) pkey_alloc(0x0, 0x2) r5 = socket(0x2, 0x80805, 0x0) syz_mount_image$nfs(&(0x7f0000000480)='nfs\x00', &(0x7f00000004c0)='./file1\x00', 0x4b21, 0x1, &(0x7f00000028c0)=[{&(0x7f0000002800)="e4b2a601ab55940beabcef4099661174bced812d675bf6666794452e047c4f8a73ce05403939f35e8476a832920cd357c501b35e7aa193ba723cdb71f4959d67a4b124b34247e136f8ec5267004ad71a", 0x50, 0x4}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x300, r5, &(0x7f0000000000)={0x30000010}) 18:19:13 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:13 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:13 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xbf000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x9000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:13 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xfd000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 919.307082][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 919.312992][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 919.547781][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 919.554168][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:13 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:15 executing program 4: r0 = syz_open_dev$dspn(0x0, 0x0, 0x40) write$UHID_CREATE2(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000007000000f40000004b677dbe56"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, 0x0, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x3}, &(0x7f0000000240)=0x8) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, 0x0, 0x800, 0x0) 18:19:15 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xfdffffff, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:15 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c00030008000400080000001400060061d7f801743790110148d38dfe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e4cc1f4333a819cd928e747bf2eb5b57b5d3d68aa6a7133e7680ee3a1e79"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xa000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:15 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x4400, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x0, 0x80004) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000500)='\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, r3, 0x0, 0x1) tkill(r3, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000400)={r4, 0x68, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x2f8fb770, @local, 0x9}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000440)=0x10) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000200)="b37b929ecfb47d246eb390c01edf054a6ad56a3e8bbe120cc9b25a3faeb18a4e0f9d51de4a9fe7a5656db28693beaeb79356c4b5718eea14db8f0d1f18d5044cd14171c6388b2b0af59e820fe2137ce16e14a5e3a0e5583c56711e895fa04e4e7005", 0x62) bpf$MAP_CREATE(0x2, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1b53) pkey_alloc(0x0, 0x2) r5 = socket(0x2, 0x80805, 0x0) syz_mount_image$nfs(&(0x7f0000000480)='nfs\x00', &(0x7f00000004c0)='./file1\x00', 0x4b21, 0x1, &(0x7f00000028c0)=[{&(0x7f0000002800)="e4b2a601ab55940beabcef4099661174bced812d675bf6666794452e047c4f8a73ce05403939f35e8476a832920cd357c501b35e7aa193ba723cdb71f4959d67a4b124b34247e136f8ec5267004ad71a", 0x50, 0x4}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x300, r5, &(0x7f0000000000)={0x30000010}) 18:19:16 executing program 4: getrandom(&(0x7f00000001c0)=""/129, 0x81, 0x2) 18:19:16 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xfeffffff, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:16 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, &(0x7f0000000e80)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) add_key$user(0x0, &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4d", 0x22, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x119040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xb000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:16 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x5551, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 18:19:16 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x202, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_SET_CPUID(r0, 0xc0105512, &(0x7f00000002c0)={0x0, 0x5517}) 18:19:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "8e519901d693e390c2849abe6b14901a84289395a7196030fff7de511ccc5ca7c28e06a93d17547dca88fcb8a976ea0a"}, 0x88) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff8) 18:19:16 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xff000000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:16 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x800400000105082) r1 = memfd_create(&(0x7f0000000480)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100), 0x1}], 0x3e9, 0x81003) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x3975f324) 18:19:17 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x0, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x0, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x0, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x0, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xff030000, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 18:19:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:'}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f00000006c0)={{0x8, 0x7, 0x0, 0x8, 'syz1\x00', 0xb28}, 0x1, [0xfffffffffffffffb, 0x4, 0x8000, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffffa, 0x8, 0x3, 0x180000, 0x77, 0x1000, 0x3, 0x0, 0x480000000000, 0x8000, 0x7f, 0x100000000, 0x0, 0xfa1b, 0x9, 0xff, 0x7fff, 0x10001, 0x0, 0xffffffff, 0x100, 0x8001, 0x9, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0x0, 0x9, 0x3, 0x0, 0x9, 0x80, 0x8, 0x0, 0x0, 0x7fffffff, 0x6e7, 0x2, 0x0, 0x0, 0x29, 0x0, 0x6, 0xffffffff, 0x30, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x5b4f, 0x1f1, 0x0, 0x8, 0x6, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x2, 0x6, 0x7ff, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x9, 0x0, 0x52be, 0x0, 0x80, 0x6, 0x8, 0x8, 0x0, 0x9, 0x8, 0x4c, 0x8, 0x9, 0xcf, 0x2c4eabb6, 0x0, 0x0, 0x4, 0x5, 0x91, 0x9, 0x54f7, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x3, 0x0, 0x7fffffff, 0x10001, 0x5, 0x269d, 0x8, 0xee2b, 0x3f, 0x0, 0x7, 0x6, 0x5, 0x0, 0x3, 0x3, 0x7, 0x7, 0x1, 0x440, 0x5], {0x77359400}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xc000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000480)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 922.854000][T30043] page:ffffea000218b580 count:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 922.883475][T30043] flags: 0x1fffc0000000000() [ 922.910346][T30043] raw: 01fffc0000000000 dead000000000100 dead000000000200 0000000000000000 [ 922.967113][T30043] raw: 0000000000000000 ffff888096d2c948 00000001fffff9ff ffff88805bf26bc0 [ 923.017132][T30043] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 923.027826][T30043] page->mem_cgroup:ffff88805bf26bc0 [ 923.042529][T30043] ------------[ cut here ]------------ [ 923.048025][T30043] kernel BUG at include/linux/mm.h:579! [ 923.117955][T30043] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 923.124068][T30043] CPU: 0 PID: 30043 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190226 #43 [ 923.133176][T30043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 923.143312][T30043] RIP: 0010:generic_pipe_buf_release+0x120/0x160 [ 923.149637][T30043] Code: bd ff 4c 89 e7 e8 90 43 db ff e8 bb 29 bd ff 5b 41 5c 41 5d 5d c3 e8 af 29 bd ff 48 c7 c6 20 98 75 87 4c 89 e7 e8 c0 db e4 ff <0f> 0b e8 99 29 bd ff 4d 8d 65 ff e9 3d ff ff ff 48 89 df e8 e8 f8 [ 923.169237][T30043] RSP: 0018:ffff888092b37920 EFLAGS: 00010216 [ 923.175305][T30043] RAX: 0000000000040000 RBX: ffffea000218b5b4 RCX: ffffc9000e677000 [ 923.183266][T30043] RDX: 0000000000032267 RSI: ffffffff81982852 RDI: ffffed1012566f08 [ 923.191238][T30043] RBP: ffff888092b37938 R08: 0000000000000021 R09: ffffed1015d05011 [ 923.199204][T30043] R10: ffffed1015d05010 R11: ffff8880ae828087 R12: ffffea000218b580 [ 923.207168][T30043] R13: 0000000000000000 R14: ffff88809bbdf780 R15: ffff88809b4df6c0 [ 923.215141][T30043] FS: 00007f28444a7700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 923.224069][T30043] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 923.230665][T30043] CR2: 00007f9111a3a330 CR3: 000000008abd5000 CR4: 00000000001406f0 [ 923.238634][T30043] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 923.246606][T30043] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 923.254585][T30043] Call Trace: [ 923.257930][T30043] iter_file_splice_write+0x7d1/0xbe0 [ 923.263344][T30043] ? atime_needs_update+0x5f0/0x5f0 [ 923.268637][T30043] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 923.274627][T30043] ? rw_verify_area+0x118/0x360 [ 923.279569][T30043] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 923.285553][T30043] direct_splice_actor+0x126/0x1a0 [ 923.290668][T30043] splice_direct_to_actor+0x369/0x970 [ 923.296047][T30043] ? generic_pipe_buf_nosteal+0x10/0x10 [ 923.301600][T30043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 923.307839][T30043] ? do_splice_to+0x190/0x190 [ 923.312519][T30043] ? rw_verify_area+0x118/0x360 [ 923.317370][T30043] do_splice_direct+0x1da/0x2a0 [ 923.322227][T30043] ? splice_direct_to_actor+0x970/0x970 [ 923.327905][T30043] ? rw_verify_area+0x118/0x360 [ 923.332761][T30043] do_sendfile+0x597/0xd00 [ 923.335495][ T3875] kobject: 'loop5' (0000000003dc27e8): kobject_uevent_env [ 923.337181][T30043] ? do_compat_pwritev64+0x1c0/0x1c0 [ 923.337196][T30043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 923.337261][T30043] ? put_timespec64+0xda/0x140 [ 923.337281][T30043] __x64_sys_sendfile64+0x1dd/0x220 [ 923.344425][ T3875] kobject: 'loop5' (0000000003dc27e8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 923.349635][T30043] ? __ia32_sys_sendfile+0x230/0x230 [ 923.349649][T30043] ? do_syscall_64+0x26/0x610 [ 923.349662][T30043] ? lockdep_hardirqs_on+0x418/0x5d0 [ 923.349677][T30043] ? trace_hardirqs_on+0x67/0x230 [ 923.349692][T30043] do_syscall_64+0x103/0x610 [ 923.349709][T30043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 923.349719][T30043] RIP: 0033:0x457e29 [ 923.349730][T30043] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 923.349743][T30043] RSP: 002b:00007f28444a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 923.384555][ T3875] kobject: 'loop3' (0000000083f7bf69): kobject_uevent_env [ 923.385947][T30043] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 923.392911][ T3875] kobject: 'loop3' (0000000083f7bf69): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 923.396211][T30043] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 923.396220][T30043] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 923.396233][T30043] R10: 000000003975f324 R11: 0000000000000246 R12: 00007f28444a76d4 [ 923.487687][T30043] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 923.495688][T30043] Modules linked in: [ 923.500149][T30043] ---[ end trace b6b2f09cb9b5f04c ]--- [ 923.505609][T30043] RIP: 0010:generic_pipe_buf_release+0x120/0x160 [ 923.511969][T30043] Code: bd ff 4c 89 e7 e8 90 43 db ff e8 bb 29 bd ff 5b 41 5c 41 5d 5d c3 e8 af 29 bd ff 48 c7 c6 20 98 75 87 4c 89 e7 e8 c0 db e4 ff <0f> 0b e8 99 29 bd ff 4d 8d 65 ff e9 3d ff ff ff 48 89 df e8 e8 f8 [ 923.531769][T30043] RSP: 0018:ffff888092b37920 EFLAGS: 00010216 [ 923.537858][T30043] RAX: 0000000000040000 RBX: ffffea000218b5b4 RCX: ffffc9000e677000 [ 923.545833][T30043] RDX: 0000000000032267 RSI: ffffffff81982852 RDI: ffffed1012566f08 [ 923.554216][T30043] RBP: ffff888092b37938 R08: 0000000000000021 R09: ffffed1015d05011 [ 923.562229][T30043] R10: ffffed1015d05010 R11: ffff8880ae828087 R12: ffffea000218b580 [ 923.570223][T30043] R13: 0000000000000000 R14: ffff88809bbdf780 R15: ffff88809b4df6c0 [ 923.578215][T30043] FS: 00007f28444a7700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 923.587169][T30043] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 923.593759][T30043] CR2: 00007f9111a3a330 CR3: 000000008abd5000 CR4: 00000000001406f0 [ 923.601754][T30043] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 923.609760][T30043] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 923.617766][T30043] Kernel panic - not syncing: Fatal exception [ 923.624899][T30043] Kernel Offset: disabled [ 923.629222][T30043] Rebooting in 86400 seconds..