x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0xc00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:11 executing program 5: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f0000000880)="43dd25310000006565d934574d0faea529000000470f139000800000085dfcc4e1fea56ffafa2e66460f3815f49d618fc920015e004d1ed6ae66470f1b5ae3c441f9284c1ad223ca3acac46318788a9ba9969943990c992e26470f124ba7f2450f2a32ffffff07660f58fd") writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="385d4b12", 0x4}], 0x1) 07:53:11 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000680)=[@in6={0xa, 0x4e23, 0x8, @rand_addr="207ee7939185ff44696440c5f96143ed", 0x84}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x200, @mcast2, 0x80}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x100000001}, @in={0x2, 0x4e23, @remote}], 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:11 executing program 5: syz_execute_func(&(0x7f0000000100)="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") pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="12a5085f3ab2d01f98fe599af5e0771246f37ae03512e048c6ca22913fb2c03df0f9948b102623317e05cfcc51c6346f0900c20916133ca8f059a88c", 0x3c}], 0x1, 0x0) syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e64993fcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0a90683c4c4a7f8") 07:53:11 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, 0x0}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 07:53:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0xd00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, 0x0}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 07:53:12 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000680)=[@in6={0xa, 0x4e23, 0x8, @rand_addr="207ee7939185ff44696440c5f96143ed", 0x84}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x200, @mcast2, 0x80}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x100000001}, @in={0x2, 0x4e23, @remote}], 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:12 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:12 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:13 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:13 executing program 5: keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{0x0, 0xfffffffffffffeeb}], 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) syz_open_dev$media(0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) socket$inet(0x2, 0x0, 0x0) 07:53:13 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000680)=[@in6={0xa, 0x4e23, 0x8, @rand_addr="207ee7939185ff44696440c5f96143ed", 0x84}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x200, @mcast2, 0x80}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x100000001}, @in={0x2, 0x4e23, @remote}], 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0xe00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:13 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:14 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:14 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000680)=[@in6={0xa, 0x4e23, 0x8, @rand_addr="207ee7939185ff44696440c5f96143ed", 0x84}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x200, @mcast2, 0x80}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x100000001}, @in={0x2, 0x4e23, @remote}], 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0xf00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:15 executing program 5: pipe(&(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000001740)=""/4096, 0x1000) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{0x0}], 0x1, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x8288, 0x0) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0) r4 = open(&(0x7f0000000480)='./file0\x00', 0x8002, 0x2) fcntl$setstatus(r2, 0x4, 0x80) pwritev(r4, &(0x7f00000003c0), 0x273, 0x0) fsync(r4) symlink(&(0x7f00000000c0)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) pwritev(r3, &(0x7f00000003c0), 0x273, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0) write(r1, &(0x7f0000000100)='w', 0x1) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) 07:53:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:15 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:15 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000680)=[@in6={0xa, 0x4e23, 0x8, @rand_addr="207ee7939185ff44696440c5f96143ed", 0x84}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x200, @mcast2, 0x80}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x100000001}, @in={0x2, 0x4e23, @remote}], 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(0xffffffffffffffff) close(r2) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) 07:53:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(0xffffffffffffffff) close(r2) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) 07:53:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0xffffffffffffffff, 0x0, 0x0) semget(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), 0x0) semget(0x1, 0x0, 0x120) 07:53:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(0xffffffffffffffff) close(r2) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) 07:53:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(0xffffffffffffffff) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:16 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:16 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB='m'], 0x0) setitimer(0x0, &(0x7f0000000080)={{0x0, 0x370}, {0x7}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:53:16 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000680)=[@in6={0xa, 0x4e23, 0x8, @rand_addr="207ee7939185ff44696440c5f96143ed", 0x84}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x200, @mcast2, 0x80}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x100000001}, @in={0x2, 0x4e23, @remote}], 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(0xffffffffffffffff) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x150}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:53:16 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:53:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(0xffffffffffffffff) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:16 executing program 5: syz_execute_func(&(0x7f0000000340)="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") sendto$inet(0xffffffffffffffff, &(0x7f0000000080)='\n', 0x1, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffff2e2e0f181022cdbc") 07:53:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(0xffffffffffffffff, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:53:17 executing program 5: socket$kcm(0x2, 0x0, 0x84) socketpair(0x0, 0x2000000003, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1290.241593][ T9794] device bridge_slave_1 left promiscuous mode [ 1290.247856][ T9794] bridge0: port 2(bridge_slave_1) entered disabled state 07:53:17 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000680)=[@in6={0xa, 0x4e23, 0x8, @rand_addr="207ee7939185ff44696440c5f96143ed", 0x84}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x200, @mcast2, 0x80}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x100000001}, @in={0x2, 0x4e23, @remote}], 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) [ 1290.284108][ T9794] device bridge_slave_0 left promiscuous mode [ 1290.311861][ T9794] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.544141][ T9794] device hsr_slave_1 left promiscuous mode [ 1292.585999][ T9794] device hsr_slave_0 left promiscuous mode [ 1292.646043][ T9794] team0 (unregistering): Port device team_slave_1 removed [ 1292.658009][ T9794] team0 (unregistering): Port device team_slave_0 removed [ 1292.669691][ T9794] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1292.728103][ T9794] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1292.820661][ T9794] bond0 (unregistering): Released all slaves 07:54:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:16 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x107000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:16 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(0xffffffffffffffff, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:16 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f0000000100)="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") 07:54:16 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x53cd}, 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f0000000100)="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") 07:54:16 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x53cd, 0x0, 0x1}, 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f0000000100)="989819e9c4a2791dcd04050f05bf0a000000c4a37bf0c55c41e2e9660ff8aa024800572f0f33b8c4f4064e4e4e5b26400f0fbafeefffffb74b264ad80f30091e1edee509c421045f56b7c406dd5831c4e10bf8c45b64660f3838520a96ead5cd33ed4877f866440ff4697683397fd3fb0000c0c422662ad7450f01ee167c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d266dfed43d9ee0fc60fc6a8f2ae000000f1ebeb628f8f709b2e3e0f0b36f04283a900800000002626802d08000000ba49c45c450f91f3c4638d6e8df9ffffff00ffffc481fdd7fffb110f66474eb83aa2f1fbfbe2") 07:54:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0xc4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0xc4}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:54:17 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:17 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:17 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp], 0x5) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dsp\x00', 0x20000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r2, 0x40000000af01, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001f00009b000000008000000018000000050000000000000000000000053101800800100095"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x7, 0x4, 0x9ff}, 0x10}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0x1}) [ 1351.094521][T10146] IPVS: ftp: loaded support on port[0] = 21 [ 1351.164533][T10146] chnl_net:caif_netlink_parms(): no params data found [ 1351.189110][T10146] bridge0: port 1(bridge_slave_0) entered blocking state [ 1351.196470][T10146] bridge0: port 1(bridge_slave_0) entered disabled state [ 1351.204404][T10146] device bridge_slave_0 entered promiscuous mode [ 1351.211978][T10146] bridge0: port 2(bridge_slave_1) entered blocking state [ 1351.219181][T10146] bridge0: port 2(bridge_slave_1) entered disabled state [ 1351.227146][T10146] device bridge_slave_1 entered promiscuous mode [ 1351.246129][T10146] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1351.256646][T10146] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1351.275092][T10146] team0: Port device team_slave_0 added [ 1351.282592][T10146] team0: Port device team_slave_1 added [ 1351.342811][T10146] device hsr_slave_0 entered promiscuous mode [ 1351.391391][T10146] device hsr_slave_1 entered promiscuous mode [ 1351.461676][T10146] bridge0: port 2(bridge_slave_1) entered blocking state [ 1351.468742][T10146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1351.476140][T10146] bridge0: port 1(bridge_slave_0) entered blocking state [ 1351.483285][T10146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1351.519752][T10146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1351.533351][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1351.542319][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 1351.560273][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 1351.568925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1351.582255][T10146] 8021q: adding VLAN 0 to HW filter on device team0 [ 1351.593007][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1351.601631][ T3598] bridge0: port 1(bridge_slave_0) entered blocking state [ 1351.608678][ T3598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1351.623309][T29955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1351.631930][T29955] bridge0: port 2(bridge_slave_1) entered blocking state [ 1351.638960][T29955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1351.655701][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1351.664356][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1351.677392][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1351.689560][T28375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1351.702571][T10146] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1351.714324][T10146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1351.722323][T29955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1351.744653][T10146] 8021q: adding VLAN 0 to HW filter on device batadv0 07:54:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:19 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:19 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(0xffffffffffffffff, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:19 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp], 0x5) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dsp\x00', 0x20000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r2, 0x40000000af01, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001f00009b000000008000000018000000050000000000000000000000053101800800100095"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x7, 0x4, 0x9ff}, 0x10}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0x1}) 07:54:20 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:20 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:20 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x10) semget(0x1, 0x1, 0x0) 07:54:20 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:20 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:21 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:21 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x10) 07:54:22 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:22 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, 0x0, 0x0, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:23 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:23 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:23 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:23 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:23 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB='C'], 0x0) setitimer(0x0, &(0x7f0000000080)={{0x0, 0x8000370}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:54:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:24 executing program 5: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0107000000db030000000000b5ffffffffffffff06"], 0x15) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd', 0x60}]}, 0x140) 07:54:24 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, 0x0, 0x0, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:26 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x9c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x9c}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:54:26 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x7ff, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x1, 0x0) 07:54:26 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:26 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:26 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:26 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:27 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:29 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, 0x0, 0x0, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:29 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b2334480efff3e0f49f0e649c46211dc9e000000007dfcf30f122d2bbd0000c4c279185e05c421a9f4b7379d00002e664f0f38f657fed1a7f0425783c4c469f8") 07:54:29 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:29 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:29 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:29 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x78, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x78}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:54:29 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c5864183bb5548c886210899d6b5b6d5efc576ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2"], 0x5d}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:29 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000001c0)="8f9378fb6b3e", 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000), 0x0, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:32 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0x7c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x4}]}]}, 0x7c}}, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:54:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:32 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:32 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB='C'], 0x0) setitimer(0x0, &(0x7f0000000080)={{}, {0x7}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:54:32 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:32 executing program 5: syz_execute_func(&(0x7f00000004c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab440fec3f67dddda8e80fddf6c6c466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba49c45c450f91f3c4638d6e8df9ffffff00ffff410f4acefb110fc4e251bcdfb83aa2f1fbfbe2") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB='C'], 0x0) setitimer(0x0, &(0x7f0000000080)={{}, {0x7}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:54:32 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:32 executing program 5: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000080)={0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:32 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000), 0x0, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:35 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:35 executing program 5: open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="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") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb7308670f7e1f1f94f66766440fd9e1c483457b3101653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") 07:54:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:35 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997"], 0x3f}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:35 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:35 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:35 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0xbf62, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:35 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:35 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") setitimer(0x0, &(0x7f0000000080)={{}, {0x7, 0x1fffe0000000000}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="96419cc4a2791dcd0f05bf04411100c4a37bf0c55c41e2e9666bf86402480047eb16000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c4f346dbd24407c4c48154513a7831c4c1fc29c326467703c42295ba29470f898c000000c4219d61860b000000ea33edc4e15f7ce1440ff4697683397fd3fb0000c4633d6c346786662ad78fa820ce3416f9f30f5904797c7c66f2ab440fec3f67dddda8e80fddf6c6c466f2470f2db600000000262ec3c3e2899294d8000000006566400f3a0bdc24c4416c55c60b0bc4414e53d2c5815df71954167a1954167aa815af0000c4a21dbab300000020e27917b5fdf6ffffffffeb628f8f7d9b654300f2f2f04283a900800000002626802d08000000bac402459364bc0000450f91f3c4638d6e8df9ffffff0043ffffff0f4acefb11fc0fdfb83aa2f1fb") 07:54:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000), 0x0, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:38 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x0, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:38 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x0) semget(0x1, 0x1, 0x0) semget(0x1, 0x0, 0x120) semget(0x0, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) semget(0x1, 0x0, 0x0) 07:54:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:38 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x0, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:38 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x0, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:39 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:39 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:39 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:39 executing program 5: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000080)={0xbf62, 0x0, 0x0, 0x9, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") [ 1373.551209][ T9794] device bridge_slave_1 left promiscuous mode [ 1373.557472][ T9794] bridge0: port 2(bridge_slave_1) entered disabled state [ 1373.613269][ T9794] device bridge_slave_0 left promiscuous mode [ 1373.619509][ T9794] bridge0: port 1(bridge_slave_0) entered disabled state 07:54:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)='-', 0x1, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") 07:54:41 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:41 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:41 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, 0x0, 0x0, 0x0) 07:54:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)='-', 0x1, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:42 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, 0x0, 0x0, 0x0) 07:54:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)='-', 0x1, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) [ 1375.021054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.026884][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:54:42 executing program 3: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}) getrandom(0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x0, 0x6}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000540)=""/121) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, 0x0, 0x0, 0x0) [ 1375.100886][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.106702][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:54:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:42 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) [ 1375.500883][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.506705][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:54:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1376.220953][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1376.226779][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1376.232658][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1376.238448][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1376.924330][ T9794] device hsr_slave_1 left promiscuous mode [ 1376.965244][ T9794] device hsr_slave_0 left promiscuous mode [ 1377.036959][ T9794] team0 (unregistering): Port device team_slave_1 removed [ 1377.048824][ T9794] team0 (unregistering): Port device team_slave_0 removed [ 1377.060359][ T9794] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1377.125990][ T9794] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1377.219616][ T9794] bond0 (unregistering): Released all slaves 07:54:44 executing program 5: syz_execute_func(&(0x7f0000000380)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed8fe8189ff2bb4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000bac749c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c4e1f9c5cb73d70f2f1f1f94f6676664a8a8d9e1c483457b3101653e0f212dd5d5fdece1e1a7fde431ffffa2919224fbb2") 07:54:44 executing program 3: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:44 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x68, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x68}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:54:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x10000, &(0x7f0000000080)) 07:54:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x4, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x120) semget(0x0, 0x2, 0x8) 07:54:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(0x0) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0x1, 0x1, 0x0) semget(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0x8) semget(0x1, 0x0, 0x120) 07:54:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(0x0) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:45 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(0x0) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:46 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x4, 0x10) semget(0x1, 0x1, 0x1) semget(0x0, 0x2, 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xfff}, 0x8) 07:54:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x10) semget(0x1, 0x1, 0x1) semget(0x0, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2, 0xfff}, 0x8) 07:54:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0xc0, 0x0) 07:54:46 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x0, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xc0, 0x0) 07:54:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x1f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xc0, 0x0) 07:54:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xc0, 0x0) 07:54:47 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") setitimer(0x0, &(0x7f0000000080)={{0x0, 0x8000370}, {0x0, 0x1fffe0000000000}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:54:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 07:54:47 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x0, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c5864183bb5548c886210899d6b5b6d5efc576ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb"], 0x5e}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:47 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="12", 0x1}], 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b2334480efff3e0f49f0e649c46211dc9e000000007dfcf30f122d2bbd0000c4c279185e05c421a9f4b7379d00002e664f0f38f657fed1a7f0425783c4c469f8") 07:54:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 07:54:47 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f00000001c0)="43dd25210000006565d93457c4e3f12145b23303e348df1c551c55935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 07:54:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1ba}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:48 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB='m'], 0x0) setitimer(0x0, &(0x7f0000000080)={{}, {0x7}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:54:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) sendto(r1, &(0x7f0000000000)="2dbf", 0x2, 0x40091, 0x0, 0x0) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 07:54:48 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0xbf62, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:48 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x0, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000240)={0x9, 0x6}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000003c0)=""/160, 0xa0}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) readv(r2, &(0x7f0000000540), 0x10000000000002f4) 07:54:48 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0xbf62}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x8, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}]}]}, 0x5c}}, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:54:48 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB='m'], 0x0) setitimer(0x0, &(0x7f0000000080)={{0x0, 0x370}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="96419cc4a2791dcd0f05bf04411100c4a37bf0c55c41e2e9666bf86402480047eb16000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c4f346dbd24407c4c48154513a7831c4c1fc29c326467703c42295ba29470f898c000000c4219d61860b000000ea33edc4e15f7ce1440ff4697683397fd3fb0000c4633d6c346786662ad78fa820ce3416f9f30f5904797c7c66f2ab440fec3f67dddda8e80fddf6c6c466f2470f2db600000000262ec3c3e2899294d8000000006566400f3a0bdc24c4416c55c60b0bc4414e53d2c5815df71954167a1954167aa815af0000c4a21dbab300000020e27917b5fdf6ffffffffeb628f8f7d9b654300f2f2f04283a900800000002626802d08000000bac402459364bc0000450f91f3c4638d6e8df9ffffff0043ffffff0f4acefb11fc0fdfb83aa2f1fb") 07:54:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6d"], 0x30}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 07:54:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:49 executing program 4: syz_execute_func(&(0x7f0000000b00)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa024800570033b8c4f4014e4e4e5b80c70030091e1edee509c421045f4607c421dd5831c4e10bf8c45b8f4868cd2e2a470f898c000000c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c166f663000000c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000f9ffffff47696c65302f"], 0x1, 0x0}, 0x0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x140, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xfc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 07:54:49 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:49 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB='C'], 0x0) setitimer(0x0, &(0x7f0000000080)={{0x0, 0x8000370}, {0x7}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:54:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x140, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xfc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 07:54:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xe4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 07:54:49 executing program 4: syz_execute_func(&(0x7f0000000380)="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") syz_execute_func(&(0x7f00000000c0)="43dd25310000006565d93457c4e1f9c5cb7308670f7e1f1f94c4a3757d0588ea0000010fd9e1c483457b3101653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") 07:54:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x10) semget(0x1, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2, 0xfff}, 0x8) 07:54:49 executing program 5: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997d5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3ee2e2efcf"], 0x59}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:50 executing program 5: syz_execute_func(&(0x7f00000004c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab440fec3f67dddda8e80fddf6c6c466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba49c45c450f91f3c4638d6e8df9ffffff00ffff410f4acefb110fc4e251bcdfb83aa2f1fbfbe2") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB='C'], 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="96419cc4a2791dcd0f05bf04411100c4a37bf0c55c41e2e9666bf86402480047eb16000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c4f346dbd24407c4c48154513a7831c4c1fc29c326467703c42295ba29470f898c000000c4219d61860b000000ea33edc4e15f7ce1440ff4697683397fd3fb0000c4633d6c346786662ad78fa820ce3416f9f30f5904797c7c66f2ab440fec3f67dddda8e80fddf6c6c466f2470f2db600000000262ec3c3e2899294d8000000006566400f3a0bdc24c4416c55c60b0bc4414e53d2c5815df71954167a1954167aa815af0000c4a21dbab300000020e27917b5fdf6ffffffffeb628f8f7d9b654300f2f2f04283a900800000002626802d08000000bac402459364bc0000450f91f3c4638d6e8df9ffffff0043ffffff0f4acefb11fc0fdfb83aa2f1fb") 07:54:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:50 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:50 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="12a5085f3ab2d01f98fe5b", 0xb}], 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b2334480efff3e0f49f0e649c46211dc9e000000007dfcf30f122d2bbd0000c4c279185e05c421a9f4b7379d00002e664f0f38f657fed1a7f0425783c4c469f8") 07:54:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0xbc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0xbc}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:54:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x229}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x722238690f349a1a, 0x1, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = gettid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x81, 0x8f, 0x9, 0x0, 0x0, 0x2, 0x1000, 0x4, 0x6, 0x0, 0x8, 0x7, 0x3f, 0x5, 0x80000001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfa, 0xffffffffffffff11, 0x3ff, 0x0, 0x100, 0x9, 0x6, 0x100000001, 0x0, 0xeb, 0x6, 0x7, 0x7, 0x590, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x3, 0x0, 0x1, 0x2628, 0x4718, 0x1}, r5, 0x7, r2, 0x3) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x6) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0, r3}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) 07:54:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f124c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr-camellia-aesni,nhpoly1305-generic)\x00'}, 0x58) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) 07:54:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428d448cf820f4706031e75835813e13b954579822cabf5c49c204788c967997833ccbf197ef5fe6a6fa3b8cc8808fb8af13058263c1f576dad05236f15a8d4d9d46f05a2d510e430f553756fd3aae8cbbebac5f2"], 0x149}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x1, 0x0) 07:54:51 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:51 executing program 3: 07:54:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:51 executing program 4: 07:54:51 executing program 3: 07:54:51 executing program 4: 07:54:51 executing program 3: 07:54:52 executing program 4: 07:54:52 executing program 3: 07:54:52 executing program 4: 07:54:52 executing program 5: 07:54:52 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:52 executing program 5: 07:54:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:52 executing program 4: 07:54:52 executing program 3: 07:54:52 executing program 5: 07:54:52 executing program 4: 07:54:52 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:52 executing program 3: 07:54:52 executing program 5: 07:54:53 executing program 4: 07:54:53 executing program 3: 07:54:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:53 executing program 5: 07:54:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:53 executing program 3: 07:54:53 executing program 4: 07:54:53 executing program 5: 07:54:53 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:53 executing program 5: 07:54:53 executing program 3: 07:54:53 executing program 4: 07:54:54 executing program 3: 07:54:54 executing program 4: 07:54:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:54 executing program 5: 07:54:54 executing program 3: 07:54:54 executing program 4: 07:54:54 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:54 executing program 5: 07:54:54 executing program 3: 07:54:54 executing program 5: 07:54:54 executing program 4: 07:54:55 executing program 4: 07:54:55 executing program 5: 07:54:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:55 executing program 3: 07:54:55 executing program 4: 07:54:55 executing program 5: 07:54:55 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:55 executing program 5: 07:54:55 executing program 3: 07:54:55 executing program 4: 07:54:55 executing program 4: 07:54:56 executing program 5: 07:54:56 executing program 3: 07:54:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:56 executing program 4: 07:54:56 executing program 5: 07:54:56 executing program 3: 07:54:56 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:56 executing program 4: 07:54:56 executing program 3: 07:54:56 executing program 5: 07:54:56 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:57 executing program 3: 07:54:57 executing program 5: 07:54:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:57 executing program 4: 07:54:57 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)='8', 0x1}], 0x1) syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000000)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfc0f3a0f30e1c1c22e2e664f0f38f657fead0efc772a") 07:54:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0), 0x0) 07:54:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x17c}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100"/16], 0x10}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:57 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") setitimer(0x0, &(0x7f0000000080)={{0x0, 0x8000370}, {0x7, 0x1fffe0000000000}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="96419cc4a2791dcd0f05bf04411100c4a37bf0c55c41e2e9666bf86402480047eb16000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c4f346dbd24407c4c48154513a7831c4c1fc29c326467703c42295ba29470f898c000000c4219d61860b000000ea33edc4e15f7ce1440ff4697683397fd3fb0000c4633d6c346786662ad78fa820ce3416f9f30f5904797c7c66f2ab440fec3f67dddda8e80fddf6c6c466f2470f2db600000000262ec3c3e2899294d8000000006566400f3a0bdc24c4416c55c60b0bc4414e53d2c5815df71954167a1954167aa815af0000c4a21dbab300000020e27917b5fdf6ffffffffeb628f8f7d9b654300f2f2f04283a900800000002626802d08000000bac402459364bc0000450f91f3c4638d6e8df9ffffff0043ffffff0f4acefb11fc0fdfb83aa2f1fb") 07:54:57 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:58 executing program 5: setitimer(0x0, &(0x7f0000000080)={{}, {0x7, 0x1fffe0000000000}}, 0x0) 07:54:58 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0xfffffe80}, 0x0) syz_execute_func(&(0x7f0000000c40)="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") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="3467d104463b7e", 0x7}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 07:54:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000b5000000000000000000005188adfdb4cc55070002d9f137b127c829273502eb42cd8030f39022e15b9479d77bfc098beef32dc3fabf1cc4ad639e0db270328b9270a905"], 0x48}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:54:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:58 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0xfffffe80}, 0x0) syz_execute_func(&(0x7f0000000c40)="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") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 07:54:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3"], 0x2a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:58 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000300)=0x1) r2 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="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", 0xfd}], 0x1}, 0x20040800) unlink(&(0x7f0000000480)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000200)={0xffffffffffffff9c}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r5 = socket$kcm(0x29, 0x5, 0x0) r6 = gettid() ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r6, 0xa, r3, 0x2) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000080)) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f00000007c0)) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) 07:54:58 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0xbf62, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:58 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:58 executing program 3: syz_execute_func(&(0x7f00000005c0)="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") syz_execute_func(&(0x7f0000000240)="43dd250100000065d93457043ac461c5dfb300f0ffffd49cf5430fe754e00083efd8d8af110000c4617d54d0f2e000c441d956c10f7fdb450fef4ee0c441b9d0eaf326470f0f0a0d400f49cf440fc5ca4a4e8fe99099588d641e660ff4160f38c852bdc46298f7410080b070c481795159d19d0df0ffff06c3001db26565f30f11038fa1300f0f331cc4a13de66565f0f75397f21afaf51a74744540400f1b22") 07:54:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0x1, 0x1, 0x0) semget(0x1, 0x3, 0x0) 07:54:58 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/94, 0x5e}, 0x0) syz_execute_func(&(0x7f0000000240)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0bc4a3c1483194c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6443ff9e0080000036f04283a900800000202626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)='4', 0x1}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e1ad3bc442f9921c7dfd2fd38f4be1a9e915c285e6f60000c10000c44285970fc4c1c2c2e610f3af8f092002c936f3d116") 07:54:59 executing program 3: syz_execute_func(&(0x7f0000000340)="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") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffff2e2e0f181022cdbc") 07:54:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x2b8}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:54:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:54:59 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0xbf62, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:54:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0x1, 0x1, 0x0) semget(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), 0x0) semget(0x1, 0x3, 0x120) 07:54:59 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:54:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de"], 0x1e}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997d5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3ee2"], 0x56}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:00 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:00 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:00 executing program 3: syz_execute_func(&(0x7f00000004c0)="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") setitimer(0x0, &(0x7f0000000080)={{0x0, 0x8000370}, {0x7}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:55:00 executing program 4: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f18065742b50f1c18c7dec"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{}, {0x6}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 07:55:00 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774b946745447029403b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53aac17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77a6cb16d55331b541e132fb8529af19992c67650e6c1a5d3475378d27a85ac7bc8e4a59e7068f846977a5fbabeb59dc0dd08e3e072ba0bddb4ba0e88a457aa836aef0dfd63c5c281734943949ee861e388d5540c1bb69e84f4747e8ab40a715ac59642329a2b04ff98079d67a92083406f9c851a59692e6cb482cbd74c9bc82c80a50ab1a9baa9a146e39b5c2f9753c18e2fb6c9078a8d6d787dfbd21351297825689562a87fba8191075a0a11fa9be1288dcf5947da9d82ba5cb7393effc2ab661d4116270c9e026c59348b16bd3bf1209f6b4dad708a56be827de80c4c68a235a1d"], 0x1a1}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:00 executing program 4: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d93457c05cc2709c3b3b42f9921c7dfd2f8fe846d9f6fc0faa0fd38806c61f71c4c1c2c213e698bbf30ca7fd67f265f398c5acc432add4e894") syz_execute_func(&(0x7f0000000000)="43dd25010100007565d93457476dd51912ff826d6d96752666420fe982000000007f5bf78f29a89daf0000000036a7c4a3f9082a0b46aec4c37d790d00000000cc") syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000000)="43dd250100000065d93457043a939c9cf5430fe754e00000d883af110000c4617d54d0f2e000550f7fdb9d9df326470f0f0a0d53440fc5ca4a4e0e8fe99099588d641e660ff4160f38c852bdea80b070c48179515965a1da804a4a450fde6706c3806ab23af30f11038fa1300f0f331cc4a13de66565f0f75397f21afaf51a74744540400f1b22") 07:55:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0x1, 0x1, 0x0) semget(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0x8) semget(0x1, 0x3, 0x0) 07:55:00 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:01 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") setitimer(0x0, &(0x7f0000000080)={{}, {0x7}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:55:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x14b}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:01 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428d448cf820f4706031e75835813e13b954579822cabf5c49c204788c967997833ccbf197ef5fe6a6fa3b8cc8808fb8af13058263c1f576dad05236f15a8d4d9d46f05a2d510e430f553756fd3aae8cbbebac5f2ca2a3eb779f29b0a7fb6cffc073f9c9d76da64ca91814f1a08c83ab9c767b1f24c"], 0x16a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x0) semget(0x1, 0x1, 0x0) semget(0x0, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) semget(0x1, 0x0, 0x0) 07:55:01 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:01 executing program 4: r0 = socket$packet(0x11, 0x2000100000000a, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0xb1, 0x0, 0x0, 0x40000000}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005b40)='team\x00') 07:55:01 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:01 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0xb8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0xb8}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:55:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:02 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0x1, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) 07:55:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x10) semget(0xffffffffffffffff, 0x1, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 07:55:02 executing program 3: syz_execute_func(&(0x7f00000004c0)="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") setitimer(0x0, &(0x7f0000000080)={{}, {0x0, 0x1fffe0000000000}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c421fc50c7653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:55:02 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0xfffffe80}, 0x0) syz_execute_func(&(0x7f0000000c40)="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") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="3467d104463b7ec4286dcb93f310842e4c9770c4ebc33412ecfaf3", 0x1b}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 07:55:02 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0x74, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x4}]}]}, 0x74}}, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:55:02 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:03 executing program 3: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f18065742b50f1c18c7decc142d507a60eb688c34982820c5a9fd797ca74"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{}, {0x6}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 07:55:03 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:03 executing program 5: pipe2(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000380)="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") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb7308670f7e1f1f94f66766440fd9e1c483457b3101653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") 07:55:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fe, &(0x7f0000000100)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xf0ff7f00000000}, 0x302) 07:55:03 executing program 3: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f0000000000)="43dd250100000065d93457043a939c9cf5430fe754e00000d883af110000c4617d54d0f2e000550f7fdb9d9df326470f0f0a0d53440fc5ca4a4e0e8fe99099588d641e660ff4160f38c852bdea80b070c48179515965a1da804a4a450fde6706c3806ab23af30f11038fa1300f0f331cc4a13de66565f0f75397f21afaf51a74744540400f1b22") 07:55:03 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:03 executing program 3: syz_execute_func(&(0x7f0000000380)="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") syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eecec617d5a73228f097892312d2bbd000010c43c42192d1e9f9ffffff9c4c4c9a90f8d") 07:55:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997d5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3ee2e2ef"], 0x58}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x2f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:03 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd0000c4e3097a030ec1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:03 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:03 executing program 5: syz_execute_func(&(0x7f00000004c0)="964a19e9c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ea74b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096a4ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79ceb066b1f72ec3c4e2899294d80000000019c2c4817f1287f613788a0b0b0000c4414e53d2c58160160fc60fc6a8f2ae000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d1d4b000000c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") pwritev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000100)="fd9cdcc81b49e1c12224cda0312b32", 0xf}], 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000140)={@loopback, @broadcast, 0x1}, 0x10) syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 07:55:03 executing program 3: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f0000000000)="43dd25010100007565d93457476dd51912ff826d6d96752666420fe982000000007f5bf78f29a89daf0000000036a7c4a3f9082a0b46aec4c37d790d00000000cc") syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000000)="43dd250100000065d93457043a939c9cf5430fe754e00000d883af110000c4617d54d0f2e000550f7fdb9d9df326470f0f0a0d53440fc5ca4a4e0e8fe99099588d641e660ff4160f38c852bdea80b070c48179515965a1da804a4a450fde6706c3806ab23af30f11038fa1300f0f331cc4a13de66565f0f75397f21afaf51a74744540400f1b22") 07:55:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:04 executing program 5: 07:55:04 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:04 executing program 3: 07:55:04 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:04 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0xbf62}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:04 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, &(0x7f00000000c0)=""/94, 0x5e}, 0x0) syz_execute_func(&(0x7f0000000c40)="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") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)='4', 0x1}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 07:55:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002e80)={0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000002ec0), 0xfeb4, 0x0, 0x0, 0xfffffdb1) 07:55:04 executing program 5: 07:55:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:04 executing program 3: 07:55:05 executing program 3: 07:55:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:05 executing program 5: 07:55:05 executing program 4: 07:55:05 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:05 executing program 3: 07:55:05 executing program 4: 07:55:05 executing program 3: 07:55:05 executing program 5: 07:55:05 executing program 4: 07:55:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:05 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:05 executing program 3: 07:55:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:06 executing program 5: 07:55:06 executing program 4: 07:55:06 executing program 3: 07:55:06 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:06 executing program 5: 07:55:06 executing program 3: 07:55:06 executing program 4: 07:55:06 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:06 executing program 3: 07:55:06 executing program 5: 07:55:07 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:07 executing program 4: 07:55:07 executing program 3: 07:55:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:07 executing program 5: 07:55:07 executing program 3: 07:55:07 executing program 4: 07:55:07 executing program 5: 07:55:07 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:07 executing program 5: 07:55:07 executing program 4: 07:55:07 executing program 3: 07:55:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:07 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:07 executing program 5: 07:55:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:08 executing program 4: 07:55:08 executing program 3: 07:55:08 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x0, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:08 executing program 5: 07:55:08 executing program 4: 07:55:08 executing program 3: 07:55:08 executing program 5: 07:55:08 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x0, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:08 executing program 4: 07:55:08 executing program 3: 07:55:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:09 executing program 5: 07:55:09 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x0, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:09 executing program 4: 07:55:09 executing program 3: 07:55:09 executing program 3: 07:55:09 executing program 5: 07:55:09 executing program 4: 07:55:09 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:09 executing program 3: 07:55:09 executing program 5: 07:55:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:10 executing program 4: 07:55:10 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:10 executing program 5: 07:55:10 executing program 3: 07:55:10 executing program 5: 07:55:10 executing program 4: 07:55:10 executing program 3: 07:55:10 executing program 4: 07:55:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:10 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) 07:55:10 executing program 5: 07:55:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:11 executing program 3: 07:55:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1bb}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:11 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, 0x0, 0x0, 0x0) 07:55:11 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c40bc4a7f8") 07:55:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x222}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x6c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x6c}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:55:11 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, 0x0, 0x0, 0x0) 07:55:11 executing program 4: 07:55:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:11 executing program 3: 07:55:11 executing program 4: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000080)={0xbf62, 0x9, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:11 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x19) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x10, 0x1, 0x0}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, 0x0, 0x0, 0x0) 07:55:11 executing program 5: syz_execute_func(&(0x7f0000000b00)="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") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000f9ffffff47696c65302f"], 0x1, 0x0}, 0x0) poll(&(0x7f00000000c0)=[{}, {}], 0x2, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:11 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{0x0, 0xfffffffffffffeeb}], 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x10001, 0x40040) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000600)='/dev/dmmidi#\x00', 0x0, r0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) kexec_load(0x1, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0xa0e4}], 0x3e0000) 07:55:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f12090000009bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="ac8ac6f99a83f3762554f99d4329f65901d9a43b86ba2f9b67db620e993377f583b3911f2b09fb4a565adb15f71806d2c4562b3e3a1ffdb621ca7b58cc7a5090fe4e004a2964ea3e1da248221388f9cfd3c0763a0200a800"], 0x58}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:11 executing program 5: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f18065742b50f1c18c7decc142d507a60eb688c3"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{0x0, 0x7fff}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 07:55:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0x1, 0x1, 0x0) semget(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0x8) semget(0x1, 0x3, 0x120) 07:55:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:55:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d"], 0x2c}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x14c}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:12 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000000)="43dd25210200006565d93457c4e3f12145b23303e32255e649c4c1c72a4a085dfcf30f122d2bbd00000f3a0f30e1c1c22eb002450000c4a2bda608f0425783c4c5ad352bbb") 07:55:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 07:55:13 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp, @timestamp], 0x6) r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r1, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r2, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x7, 0x4, 0x9ff}, 0x10}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000180)={0x1}) 07:55:13 executing program 1: syz_execute_func(&(0x7f0000000080)="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") writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000900)="4d7c3f5c142d92", 0x7}], 0x1) syz_execute_func(&(0x7f0000000880)="43dd25310000006565d934574d0faea529000000470f139000800000085dfcc4e1fea56ffafa2e66460f3815f49d618fc920015e004d1ed6ae66470f1b5ae3c441f9284c1ad223ca3acac46318788a9ba9969943990c992e26470f124ba7f2450f2a32ffffff07660f58fd") writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="385d4b12", 0x4}], 0x1) 07:55:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) 07:55:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000b5000000000000000000005188adfdb4cc55070002d9f137b127c829273502eb42cd8030f39022e15b9479d77bfc098beef32dc3fabf1cc4ad639e0db270328b9270a90532"], 0x49}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:55:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000b5000000000000000000005188adfdb4cc55070002d9f133c0616c072a20139b9ac715e5c07c0227c829273502eb42cd8030"], 0x36}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:55:13 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0xbf62, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:13 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x9, 0x7, 0x0, 0x0, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffff9c, 0x4, 0x1}, 0x3c) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:55:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x39f}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:13 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="385d4b126b64f104cb2ae1", 0xb}], 0x1) syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000000)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfc0f3a0f30e1c1c22e2e664f0f38f657fead0efc772a") 07:55:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:14 executing program 5: syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r3, &(0x7f0000000640)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) dup3(r1, r3, 0x0) tkill(r2, 0x1400000000015) 07:55:14 executing program 3: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24022cbd7000fcdbdf250600000034000200080002004e240000080004000080000088e941ecb9a1000008000900789e000000000d000100000008000d0001000000080006000000000008000600ff0000001c00030008000400fdff00000800010000000000080003000000009a85e99a58e8815cf1487a5333ae099300b2fc18a9d7accda6ab47"], 0x1}, 0x1, 0x0, 0x0, 0x40008c5}, 0x40) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) 07:55:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000000)=0x4) 07:55:14 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0xbf62, 0x9, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40002, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:14 executing program 5: 07:55:14 executing program 4: 07:55:14 executing program 5: 07:55:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x10) semget(0x1, 0x1, 0x1) semget(0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) 07:55:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:14 executing program 5: 07:55:14 executing program 4: 07:55:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:15 executing program 3: 07:55:15 executing program 5: 07:55:15 executing program 4: 07:55:15 executing program 5: 07:55:15 executing program 4: 07:55:15 executing program 3: 07:55:15 executing program 5: 07:55:15 executing program 1: 07:55:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:15 executing program 4: 07:55:15 executing program 3: 07:55:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:16 executing program 5: 07:55:16 executing program 1: 07:55:16 executing program 4: 07:55:16 executing program 3: 07:55:16 executing program 1: 07:55:16 executing program 3: 07:55:16 executing program 4: 07:55:16 executing program 5: 07:55:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:16 executing program 3: 07:55:16 executing program 1: 07:55:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:17 executing program 4: 07:55:17 executing program 5: 07:55:17 executing program 3: 07:55:17 executing program 1: 07:55:17 executing program 4: 07:55:17 executing program 3: 07:55:17 executing program 5: 07:55:17 executing program 1: 07:55:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:17 executing program 5: 07:55:17 executing program 3: 07:55:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:17 executing program 4: 07:55:17 executing program 1: 07:55:17 executing program 3: 07:55:17 executing program 5: 07:55:18 executing program 3: 07:55:18 executing program 1: 07:55:18 executing program 5: 07:55:18 executing program 4: 07:55:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:18 executing program 5: 07:55:18 executing program 3: 07:55:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:18 executing program 1: 07:55:18 executing program 4: 07:55:18 executing program 5: 07:55:18 executing program 3: 07:55:18 executing program 5: 07:55:18 executing program 4: 07:55:18 executing program 3: 07:55:19 executing program 1: 07:55:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:19 executing program 5: 07:55:19 executing program 1: 07:55:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:19 executing program 3: 07:55:19 executing program 4: 07:55:19 executing program 1: 07:55:19 executing program 5: 07:55:19 executing program 1: 07:55:19 executing program 5: 07:55:19 executing program 4: 07:55:19 executing program 3: 07:55:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:20 executing program 4: 07:55:20 executing program 5: 07:55:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428d448cf820f4706031e75835813e13b954579822cabf5c49c204788c967997833ccbf197ef5fe6a6fa3b8cc8808fb8af13058263c1f576dad05236f15a8d4d9d46f05a2d510e430f553756fd3aae8cbbebac5f2ca2a3eb779f29b0a7fb6cffc073f9c9d76da64ca91814f1a08c83ab9c767b1f24c59ca4e"], 0x16d}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:20 executing program 3: syz_execute_func(&(0x7f0000000080)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000040)={0x0, 0x40000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:20 executing program 5: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000080)="66450f3a6015bb000000bd489802398fc9109619660f761500000000c421f92b13f3440f2aeec4c1fd50d146d9eb64dac4") recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002700), 0x0, &(0x7f0000002780)=""/247, 0xf7}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf30f122d2bbd00003c3cc1c2c2e610e4e4d1a7fd5783c4c4621946a6790f0000fc") 07:55:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f12090000009bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="ac8ac6f99a83f3762554f99d4329f65901d9a43b86ba2f9b67db620e993377f583b3911f2b09fb4a565adb15f71806d2c4562b3e3a1ffdb621ca7b58cc7a5090fe4e004a2964ea3e1da248221388f9cfd3c0763a0200a8006e"], 0x59}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:20 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80785659, 0x0) 07:55:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x16c}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0x6c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x4}]}]}, 0x6c}}, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:55:21 executing program 4: syz_execute_func(&(0x7f00000005c0)="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") syz_execute_func(&(0x7f0000000000)="43dd250100000065d93457043a939c9cf5430fe754e00000d883af110000c4617d54d0f2e000550f7fdb9d9df326470f0f0a0d53440fc5ca4a4e0e8fe99099588d641e660ff4160f38c852bdea80b070c48179515965a1da804a4a450fde6706c3806ab23af30f11038fa1300f0f331cc4a13de66565f0f75397f21afaf51a74744540400f1b22") 07:55:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:21 executing program 5: syz_execute_func(&(0x7f0000000080)="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") writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000240)="062f85d4caebc6f488291cc3113fa4e458f8c219e36d2adb7d", 0x19}], 0x1) syz_execute_func(&(0x7f00000001c0)="43dd25310000006565d93457460dbdc28a8ac462cdad34d81ee81b1ee81b411a8666420f50e52d47d9d0c4a1d576a9000000003e8f0236642664459d660f382a6fb7660f38407e08e53962c422119672ddc4c129d5150a000000fb890f811144d8c795c4427d192fc4416175f6c40238387d00904ffb1e0000") 07:55:21 executing program 4: syz_execute_func(&(0x7f0000000080)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000040)={0x0, 0x40000, 0x0, 0x0, 0x40}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0xcc}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:55:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) 07:55:21 executing program 4: syz_execute_func(&(0x7f0000000080)="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") select(0x40, &(0x7f0000000040)={0x0, 0x40000, 0x0, 0x0, 0x40, 0x4}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:21 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, &(0x7f00000000c0)=""/94, 0x5e}, 0x0) syz_execute_func(&(0x7f0000000c40)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0bc4a3c1483194c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6443ff9e0080000036f04283a900800000202626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)='4', 0x1}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 07:55:21 executing program 3: syz_execute_func(&(0x7f0000000080)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457460dbdc28a8ac462cdad34d81ee81b1ee81b411a8666420f50e52d47d9d0c4a1d576a9000000003e8f0236642664459dc48309482161660f38407e08e53962c422ed119672fcfcc129d5150a000000fb890f811144d8c795c4427d192fc4416175f6c40238387d00904ffb1e0000") 07:55:21 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="385d4b126b64f104cb2ae19f9d", 0xd}], 0x1) syz_execute_func(&(0x7f00000001c0)="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") writev(0xffffffffffffffff, &(0x7f0000001440)=[{&(0x7f00000000c0)="17c8b4dbff6eba00a1ab93", 0xb}], 0x1) syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00000f3a0f30e1c1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:21 executing program 1: socket$packet(0x11, 0x2000000000000003, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x200) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) stat(0x0, &(0x7f00000006c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000b40)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgroups(0x1, &(0x7f0000000c40)=[0xee00]) sendmsg$netlink(r0, &(0x7f0000000d80)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x40000c00}, 0xc, &(0x7f00000000c0)=[{&(0x7f0000000440)={0x1c, 0x13, 0x300, 0x0, 0x25dfdbfd, "", [@typed={0xc, 0x1b, @u64}]}, 0x1c}], 0x1, 0x0, 0x0, 0x4010}, 0x80) semget$private(0x0, 0x3, 0x472) 07:55:22 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x4}, {}, {0x2, 0x4}], {}, [], {}, {0x20, 0xfffffffffffffffd}}, 0x44, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x200000000000007) ftruncate(r0, 0x0) [ 1415.049669][T12247] ptrace attach of "/root/syz-executor.4"[12246] was attempted by "/root/syz-executor.4"[12247] 07:55:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000b5000000000000000000005188adfdb4cc55070002d9f133c0616c072a20139b9ac715e5c07c0227c829273502eb42cd8030f3"], 0x37}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:55:22 executing program 3: syz_execute_func(&(0x7f0000000080)="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") writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000900)="4d7c3f5c142d920bc90198c1e9fee0", 0xf}], 0x1) syz_execute_func(&(0x7f0000000880)="43dd25310000006565d934574d0faea529000000470f139000800000085dfcc4e1fea56ffafa2e66460f3815f49d618fc920015e004d1ed6ae66470f1b5ae3c441f9284c1ad223ca3acac46318788a9ba9969943990c992e26470f124ba7f2450f2a32ffffff07660f58fd") writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="385d4b12", 0x4}], 0x1) 07:55:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:22 executing program 1: syz_execute_func(&(0x7f0000000080)="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") writev(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="385d4b12", 0x4}], 0x1) syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935d3e0faee9f30f122d2bbd00000f3a0f30e1c1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428d448cf820f4706031e75835813e13b954579822cabf5c49c204788c967997833ccbf197ef5fe6a6fa3b8cc8808fb8af13058263c1f576dad05236f15a8d4d9d46f05a2d510e430f553756fd3aae8cbbebac5f2ca2a3eb779f29b0a7fb6cffc073f9c9d76da64ca91814f1a08c83ab9c767b1f24c59ca4e1fe4e501d3e220cf8146fb7c4a4726a97cd0"], 0x17f}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:22 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp, @timestamp], 0x6) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dsp\x00', 0x20000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001f00009b00000000800000001800000005000000000000000000000005310180080010009500"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r3, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x7, 0x4, 0x9ff}, 0x10}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0x1}) 07:55:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d91f7fb"], 0x2f}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:22 executing program 1: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000300)="43dd250100000065d93457043adcb810670100939c9c430fe754e0000fd883af110000c4617d54d0f2e000450f7fd391f326470f0f0a0d53c48309787927004e0e8fe99099588d641e660ff4160f38c852bdea80b070c48179515965a1da804a4a450fde6706c3806ab23af30f11038fa1300f0f331cc4a13de66565f0f75397f21afaf51a74744540400f1b22") 07:55:22 executing program 4: syz_execute_func(&(0x7f0000000080)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000040)={0x0, 0x40000, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:22 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp, @timestamp], 0x6) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dsp\x00', 0x20000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001f00009b00000000800000001800000005000000000000000000000005310180080010009500"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r3, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x7, 0x4, 0x9ff}, 0x10}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0x1}) 07:55:22 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000003c0)="43dd250100000065d93457043adcb810670100939c9c430fe754e0000fd883af110000c4617d54d0406f450f7fd391f3f0802e1ff3d8fc440fc5ca4a4e0e8fe99099588d641ec4e3155ffd07160f38c852bdea80b070c4817951a565a1da804a4a450fde6706c3806ab23a65d19bf1ff00008fa1300f0f331cc4a13de665a5a5f0f75397f21afaf51a74744540400f1b22") 07:55:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x0) semget(0x1, 0x1, 0x0) semget(0x1, 0x0, 0x120) semget(0x0, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) semget(0x1, 0x0, 0x120) 07:55:23 executing program 4: syz_execute_func(&(0x7f0000000100)="989819e9c4a2791dcd04050f05bf0a000000c4a37bf0c55c41e2e9660ff8aa024800572f0f33b8c4f4064e4e4e5b26400f0fbafeefffffb74b264ad80f30091e1edee509c421045f56b7c406dd5831c4e10bf8c45b64660f3838520a96ead5cd33ed4877f866440ff4697683397fd3fb0000c0c422662ad7450f01ee167c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d266dfed43d9ee0fc60fc6a8f2ae000000f1ebeb628f8f709b2e3e0f0b36f04283a900800000002626802d08000000ba49c45c450f91f3c4638d6e8df9ffffff00ffffc481fdd7fffb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000080)="66450f3a6015bb000000bd489802398fc9109619660f761500000000c421f92b13f3440f2aeec4c1fd50d146d9eb64dac4") recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)=""/247, 0xf7}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf30f122d2bbd00003c3cc1c2c2e610e4e4d1a7fd5783c4c4621946a6790f0000fc") 07:55:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:23 executing program 3: syz_execute_func(&(0x7f0000000240)="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") syz_execute_func(&(0x7f0000000180)="43dd250100000065d93457043adcb810100100f3460f12f2c422c13798c5da00009c430fe754e0000fd883af110000c4c2f597a691200000450f7fd3913a3a53440fc5ca4ac481785306aec4a275b8d815d21a1a410f38c852bdfeef0a17aca2aca2804a4a450fde6e670a96c3806ab23a3636a68f2130390a4c4bfec4a13d73f62ae6450f74eeee1afaf51a74744540400f1b22") 07:55:23 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000300)=0x1) r2 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="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", 0xfd}], 0x1}, 0x20040800) unlink(&(0x7f0000000480)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000200)={0xffffffffffffff9c}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r5 = socket$kcm(0x29, 0x5, 0x0) r6 = gettid() ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r6, 0xa, r3, 0x2) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000080)) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f00000007c0)) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00pids a -memory \x00i'], 0x12) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890c, &(0x7f0000000000)) 07:55:23 executing program 4: syz_execute_func(&(0x7f00000000c0)="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") syz_execute_func(&(0x7f0000000080)="66450f3a6015bb000000bd489802398fc9109619660f761500000000c421f92b13f3440f2aeec4c1fd50d146d9eb64dac4") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf30f122d2bbd00003c3cc1c2c2e610e4e4d1a7fd5783c4c4621946a6790f0000fc") 07:55:23 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x10001, 0x40040) fsconfig$FSCONFIG_SET_FD(r2, 0x5, 0x0, 0x0, r0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) kexec_load(0x1, 0x0, 0x0, 0x3e0000) 07:55:23 executing program 3: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000080)="66450f3a6015bb000000bd489802398fc9109619660f761500000000c421f92b13f3440f2aeec4c1fd50d146d9eb64dac4") recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@un=@abs, 0x8, 0x0, 0x0, &(0x7f0000002780)=""/247, 0xf7}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf30f122d2bbd00003c3cc1c2c2e610e4e4d1a7fd5783c4c4621946a6790f0000fc") 07:55:23 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935d3e0faee9f30f122d2bbd00000f3a0f30e1c1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:23 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000300)=0x1) r2 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="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", 0xfd}], 0x1}, 0x20040800) unlink(&(0x7f0000000480)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000200)={0xffffffffffffff9c}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r5 = socket$kcm(0x29, 0x5, 0x0) r6 = gettid() ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r6, 0xa, r3, 0x2) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000080)) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f00000007c0)) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00pids a -memory \x00i'], 0x12) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890c, &(0x7f0000000000)) 07:55:24 executing program 3: syz_execute_func(&(0x7f0000000100)="989819e9c4a2791dcd04050f05bf0a000000c4a37bf0c55c41e2e9660ff8aa024800572f0f33b8c4f4064e4e4e5b26400f0fbafeefffffb74b264ad80f30091e1edee509c421045f56b7c406dd5831c4e10bf8c45b64660f3838520a96ead5cd33ed4877f866440ff4697683397fd3fb0000c0c422662ad7450f01ee167c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d266dfed43d9ee0fc60fc6a8f2ae000000f1ebeb628f8f709b2e3e0f0b36f04283a900800000002626802d08000000ba49c45c450f91f3c4638d6e8df9ffffff00ffffc481fdd7fffb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000080)="66450f3a6015bb000000bd489802398fc9109619660f761500000000c421f92b13f3440f2aeec4c1fd50d146d9eb64dac4") recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@un=@abs, 0x8, &(0x7f0000002700)}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf30f122d2bbd00003c3cc1c2c2e610e4e4d1a7fd5783c4c4621946a6790f0000fc") 07:55:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:24 executing program 3: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f00000000c0)="43dd250100000065d93457a08b00000080000000b689c4617f1231470f3806a6ac000000d943816f2161d7d7470f7587ca090000c4614cc69bb100000033e4c1") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73f3dbab3b000000085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31ffffff07070f71cd20") 07:55:24 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dsp\x00', 0x20000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001f00009b00000000800000001800000005000000000000000000000005310180080010009500"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r3, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x7, 0x4, 0x9ff}, 0x10}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0x1}) 07:55:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d45157501d2be2d65946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428d448cf820f4706031e75835813e13b954579822cabf5c49c204788c967997833ccbf197ef5fe6a6fa3b8cc8808fb8af13058263c1f576dad05236f15a8d4d9d46f05a2d510e430f553756fd3aae8cba7bac5f2ca2a3eb779f29b0a7fb6cffc073f9c9d76da64ca91814f1a08c83ab9c767b1f24c59ca4ef5e4e501d3e220cf8146fb7c4a4726a97cd02b93c47222218804eebd1795e9a389f75da01498ff1e648773fb5f475018227e3181a51afc21c91c266668868d18242d62acd0c19e46a20d7e2579880633802e262c359e3a2937675d237339e1abeb27f4ae33d12ffeccb69618e6000356b856433cc859be20e7de9b899d21a99a04c5559a40cfa7ecb449df5412ed2a6fc6f5b8d6d16d81e8474d47ea907603135c43f58f8940fe3fecb80e4b03c63159f827ad5aa2c7cd90bde569cd757832446fa385df7c2202b835c30b1d337b42790ba5e9beb9d4d3b8806e2e978b5db841aff85e17cf8d73874f436bc76f336c123a7cf67e3992ae8f0645bb88d41b9437ce7593451437a1be6b7208faafad77d91ea449f7421228b7d8883e072c2abaaf80681038e15b69e0c7f4868f0cd115fd2607f0f5305114595e04359350c6b0580c5311c4dc7f89c86d3184d9fc1f9cc0250968bad83cc9ae7fa8081a6f47ca9eb7b4697b9c70af9277933c3881ff5fbc5a7264038ce11f170c24009d9d3113fa537207baacf105949e4ee99074bc199acd0b9c14fc63e77a6f54f90584779ac5d7e88ac1fbbd09f880d91c25c77570f42a7c1e6e718c40a7591ae419d5ff1cd0362fa4c9fb7ead87ea540ccfe69565abac2a4a3fd7e1090cdba043c3487c291a6d17cdb50e4ec6e7b0c437527cdecf3fe6e03727ecbb1c0284466431d782dd35c306428e3880379de2c4f47301e5d498035abd0b7a92da78aacfbf91a8ce711ab8cbedfbf4a10665c29eaa0b0ddb0c6c8ab103"], 0x3a0}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x7c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x7c}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:55:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997d5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3ee2e2"], 0x57}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:24 executing program 1: r0 = socket$inet(0x10, 0x2000000000000002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000480)) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bind$unix(r3, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000003c0)={r0}) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000380)={'rose0\x00', @ifru_ivalue=0x100}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='vxcan1\x00', 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2f0000001d0005c5ffffff000d0000000200001f01000000000002c9130001000000000050800000d18e1092e0c875", 0x2f}], 0x1}, 0x0) 07:55:24 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, 0x0, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 07:55:24 executing program 3: syz_execute_func(&(0x7f0000000b00)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa024800570033b8c4f4014e4e4e5b80c70030091e1edee509c421045f4607c421dd5831c4e10bf8c45b8f4868cd2e2a470f898c000000c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c166f663000000c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") sendto(0xffffffffffffffff, &(0x7f0000000080)="e68b33eddef124afe5d65a2fd361e31d91a16b700c", 0x15, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") [ 1417.820940][ C1] net_ratelimit: 4 callbacks suppressed [ 1417.820949][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1417.832424][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1417.838262][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1417.844102][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:55:25 executing program 3: syz_execute_func(&(0x7f0000000b00)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa024800570033b8c4f4014e4e4e5b80c70030091e1edee509c421045f4607c421dd5831c4e10bf8c45b8f4868cd2e2a470f898c000000c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c166f663000000c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") sendto(0xffffffffffffffff, &(0x7f0000000080)="e68b33eddef124afe5d65a2fd361e31d91a16b700cc2e1f95b55f2a1e5ee29", 0x1f, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:25 executing program 1: syz_execute_func(&(0x7f0000000100)="989819e9c4a2791dcd04050f05bf0a000000c4a37bf0c55c41e2e9660ff8aa024800572f0f33b8c4f4064e4e4e5b26400f0fbafeefffffb74b264ad80f30091e1edee509c421045f56b7c406dd5831c4e10bf8c45b64660f3838520a96ead5cd33ed4877f866440ff4697683397fd3fb0000c0c422662ad7450f01ee167c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d266dfed43d9ee0fc60fc6a8f2ae000000f1ebeb628f8f709b2e3e0f0b36f04283a900800000002626802d08000000ba49c45c450f91f3c4638d6e8df9ffffff00ffffc481fdd7fffb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000080)="66450f3a6015bb000000bd489802398fc9109619660f761500000000c421f92b13f3440f2aeec4c1fd50d146d9eb64dac4") recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@un=@abs, 0x8, &(0x7f0000002700), 0x0, &(0x7f0000002780)=""/247, 0xf7}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf30f122d2bbd00003c3cc1c2c2e610e4e4d1a7fd5783c4c4621946a6790f0000fc") 07:55:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c5864183"], 0x37}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:25 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dsp\x00', 0x20000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001f00009b00000000800000001800000005000000000000000000000005310180080010009500"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r3, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x7, 0x4, 0x9ff}, 0x10}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0x1}) 07:55:25 executing program 1: syz_execute_func(&(0x7f0000000340)="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") sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="0aa022e93b", 0x5, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffff2e2e0f181022cdbc") 07:55:25 executing program 4: syz_execute_func(&(0x7f0000000b00)="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") sendto(0xffffffffffffffff, &(0x7f0000000080)="e68b33eddef124afe5d65a2fd361e31d91a16b700cc2e1f95b55f2a1e5ee2948a6e303644739cd6aabd20d3d2e7764b5f7bdf268ca1126b484ed8486d9ce1b50b76c2d72e51eba", 0x47, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:25 executing program 3: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000080)="66450f3a6015bb000000bd489802398fc9109619660f761500000000c421f92b13f3440f2aeec4c1fd50d146d9eb64dac4") futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf30f122d2bbd00003c3cc1c2c2e610e4e4d1a7fd5783c4c4621946a6790f0000fc") 07:55:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c5864183bb5548c886210899d6b5b6d5efc576ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447f"], 0x6c}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:25 executing program 4: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf30f122d2bbd00003c3cc1c2c2e610e4e4d1a7fd5783c4c4621946a6790f0000fc") 07:55:25 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dsp\x00', 0x20000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001f00009b00000000800000001800000005000000000000000000000005310180080010009500"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r3, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x7, 0x4, 0x9ff}, 0x10}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0x1}) 07:55:25 executing program 4: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73f3dbab3b000000cb095dfcc4033d49d2000f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31ffffff130fd935cdbe") 07:55:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x178}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:26 executing program 1: 07:55:26 executing program 4: 07:55:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:26 executing program 3: 07:55:26 executing program 3: [ 1419.180875][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1419.186741][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:55:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000b5000000000000000000005188adfdb4cc55070002d9f133c0616c072a20139b9ac715"], 0x27}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:55:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x14d}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:26 executing program 3: 07:55:26 executing program 5: 07:55:26 executing program 3: 07:55:26 executing program 4: 07:55:26 executing program 3: 07:55:26 executing program 4: 07:55:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:27 executing program 1: 07:55:27 executing program 5: 07:55:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:27 executing program 3: 07:55:27 executing program 4: 07:55:27 executing program 5: 07:55:27 executing program 1: 07:55:27 executing program 3: 07:55:27 executing program 1: 07:55:27 executing program 5: 07:55:27 executing program 4: 07:55:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:28 executing program 3: 07:55:28 executing program 1: 07:55:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:28 executing program 4: 07:55:28 executing program 5: 07:55:28 executing program 3: 07:55:28 executing program 1: 07:55:28 executing program 3: 07:55:28 executing program 5: 07:55:28 executing program 1: 07:55:28 executing program 4: 07:55:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:29 executing program 1: 07:55:29 executing program 4: 07:55:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:29 executing program 3: 07:55:29 executing program 5: 07:55:29 executing program 1: 07:55:29 executing program 4: 07:55:29 executing program 1: 07:55:29 executing program 5: 07:55:29 executing program 3: 07:55:29 executing program 4: 07:55:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:29 executing program 3: 07:55:29 executing program 4: 07:55:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:30 executing program 1: 07:55:30 executing program 5: 07:55:30 executing program 3: 07:55:30 executing program 4: 07:55:30 executing program 3: 07:55:30 executing program 1: 07:55:30 executing program 5: 07:55:30 executing program 4: 07:55:30 executing program 5: 07:55:30 executing program 4: 07:55:30 executing program 1: syz_execute_func(&(0x7f0000000240)="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") syz_execute_func(&(0x7f00000001c0)="43dd25310000006565d93457460dbdc28a8ac462cdad34d81ee81b1ee81b411a8666420f50e52d47d9d0c4a1d576a9000000003e8f0236642664459d660f382a6fb7660f38407e08e53962c422119672ddc4c129d5150a000000fb890f811144d8c795c4427d192fc4416175f6c40238387d00904ffb1e0000") 07:55:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:31 executing program 3: 07:55:31 executing program 4: 07:55:31 executing program 5: 07:55:31 executing program 1: 07:55:31 executing program 4: 07:55:31 executing program 1: 07:55:31 executing program 3: 07:55:31 executing program 5: 07:55:31 executing program 4: 07:55:31 executing program 1: 07:55:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:32 executing program 3: 07:55:32 executing program 5: 07:55:32 executing program 4: 07:55:32 executing program 1: 07:55:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:32 executing program 4: 07:55:32 executing program 1: 07:55:32 executing program 5: 07:55:32 executing program 3: 07:55:32 executing program 1: 07:55:32 executing program 4: 07:55:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:33 executing program 5: 07:55:33 executing program 3: 07:55:33 executing program 1: 07:55:33 executing program 4: 07:55:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:33 executing program 5: 07:55:33 executing program 1: 07:55:33 executing program 4: 07:55:33 executing program 3: 07:55:33 executing program 4: 07:55:33 executing program 3: 07:55:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:34 executing program 1: 07:55:34 executing program 5: 07:55:34 executing program 4: 07:55:34 executing program 3: 07:55:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:34 executing program 3: 07:55:34 executing program 5: 07:55:34 executing program 4: 07:55:34 executing program 1: 07:55:34 executing program 1: 07:55:34 executing program 3: 07:55:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:35 executing program 5: 07:55:35 executing program 1: 07:55:35 executing program 3: 07:55:35 executing program 4: 07:55:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:35 executing program 3: 07:55:35 executing program 5: 07:55:35 executing program 4: 07:55:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000480)="f2"}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 07:55:35 executing program 3: socket$inet(0x10, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x2, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x20211, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) 07:55:35 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000240)="43dd25310000006565d93457c442f9921c7dfd2f8de84d89646566430d18dcc82d2bbd000010c4f0818056b80000990f8999999999c461c0158cbdfa1422ea69ca") 07:55:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) 07:55:36 executing program 1: 07:55:36 executing program 3: 07:55:36 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="385d4b126b64f104cb2ae19f9d", 0xd}], 0x1) syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00000f3a0f30e1c1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:36 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="385d4b126b64f104cb2ae19f9d", 0xd}], 0x1) syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057f3de99f73d000033b8c4f4014e4e4e5b4b264ad80f41ad1e1edee50946c42741839fa59d0000b527854607c421dd5831e9e9e10bf8c45b64660f38385a0a470f898c00000096ea26400f00a43902000000ed480277f8f8440ff4697683397fd3fb8f4894a2c92c05b57d215104662ad726660f73d30066400f64287c7c66f2ab440fec3f67dddda8e80fddf6c6c466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b660fe4bb46739a48c4414e53d2c4c1fc518ce00ce6fa2cc6a8f2ae000000f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba49c45c455a91b7c4638d6e8df9ffffff2323ffff410f4acefbc423f96c20ecc4e251bcdfb83aa2f1fbfb22c1e2") writev(0xffffffffffffffff, &(0x7f0000001440)=[{&(0x7f00000000c0)="17c8b4dbff6eba00a1ab938e90cafc5586809b", 0x13}], 0x1) syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00000f3a0f30e1c1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:36 executing program 1: syz_execute_func(&(0x7f00000001c0)="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") writev(0xffffffffffffffff, &(0x7f0000001440)=[{&(0x7f00000000c0)="17c8b4dbff6eba00a1ab93", 0xb}], 0x1) syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00000f3a0f30e1c1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0x78, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x4}]}]}, 0x78}}, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:55:36 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 07:55:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d91f79ecb"], 0x31}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000f9c0)={&(0x7f000000f640)=@xdp, 0x80, &(0x7f000000f8c0)}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000280)=r0, 0x706) 07:55:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000f9c0)={&(0x7f000000f640)=@xdp, 0x80, &(0x7f000000f8c0)}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000280)=r0, 0x706) 07:55:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c5864183bb"], 0x38}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:37 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 07:55:37 executing program 5: syz_execute_func(&(0x7f0000000140)="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") syz_execute_func(&(0x7f0000000240)="43dd25010000006565d93457c442f9921c78c4620938ed40d9511a3edf2341e3cbc4017951400691aeae113e660f71d000") syz_execute_func(&(0x7f0000000000)="96419cc4a2791dcd1c040f05c4e1705eeac4a37bf0c55c41e2e9c401e95dd684000f0fb8c40ff829014e4ec481a96296260000004b264ad80f41ad1e1e42a26167000000000000ff46c4274183259fa59d001ab527c4c22938544798c421dd5831e9e9e10bf866460f3a17c78c5b64660f38385a0a470f898c00000096fc26400f00a43902000000660f13a7120000004877f8460ff469d383397f5ee7e7fbfbabab8d73df0fc4227d21513a06662ad726660f73d30066400f642866f2ab440fec3f67dddda8e80fddf6c6c4665af72ec3c4e2899394000000199cc18f3e486e3e486ec4d61f8160160035ee0fc60fc6a8f2ae00f1ebeb628f1a7d9b6500f236f04283a9008000000066430f78c600005c455a91b7c4638d6e8df9ffff0c2323ffc4e3b16e9003330000a94acefb110fc4e251bcdf66440fd0be000000003aa2f1fbfb22c1e2") 07:55:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:37 executing program 4: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000340)="43dd25310000006565d93457460dbdc28a8ac462cdad34d81ee81b1ee81be52d47d9d0c4a1d576a900000000dbe436642664459d660f382a6fb7660f38407e08e53962c422a6119672ddddc129d5c7c70a000000fb890f81114452c795c4427d192fc4416175f6c40238387d0090f30f2c899eba5af81e0000") 07:55:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997d5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3ee2e2efcf6c"], 0x5a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:37 executing program 3: syz_execute_func(&(0x7f0000000b00)="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") syz_execute_func(&(0x7f0000000700)="43dd25310000006565d93457e4e4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5c463dc554adf8686a77d31fffff507070f71cd30") 07:55:37 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 07:55:37 executing program 4: syz_execute_func(&(0x7f0000000480)="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") syz_execute_func(&(0x7f00000000c0)="43dd250100000065d93457043adcb810100100939c9c430fe754e0000fd883af110000c4617d54d0f2e000c421cd62f191f326470f0f0a0d53440fc5ca4a4e0e8fe99099588d72ddf265106cd5000f38c852bdea80b070c48179515965a1da804a4a450fde6706c3806ab23af30f11038fa1300f0f331cc4a13d73f6e66565f0f75397f23e1afaf5f574744540400f1b22") 07:55:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="001000000000000000000e00000004000600500004001400030062726f6164636173742d6c696e6b00000c00010062797a31120000000c00017d73797a30000000000c0007000800030000742d6c696e6b0000100007000c000400"/114], 0x1}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0d4e18014c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae955baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e00005480") 07:55:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:38 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @sack_perm, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp, @timestamp], 0x6) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000180)={0x1}) 07:55:38 executing program 4: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000480)="f2"}) 07:55:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x2001fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 07:55:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xa) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup3(r0, r1, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x0) 07:55:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:38 executing program 3: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f18065742b50f1c18c7decc142d507a60eb688c34982820c5a9fd797ca74bda7a4b1fdb2410082f441db28a8f9ab90abb936f0b33d879915e74142de"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{0x0, 0x7fff}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 07:55:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000b5000000000000000000005188adfdb4cc55070002d9f137b127c829273502eb42cd8030f39022e15b9479d77bfc098beef32dc3fabf1cc4ad639e0db270328b9270a90532b3"], 0x4a}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:55:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x4}]}]}, 0x84}}, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:55:38 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000080)="0adc1f123c123d319bd070") sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 07:55:38 executing program 5: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1431.321609][T13140] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 07:55:38 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp, @timestamp], 0x5) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) 07:55:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:39 executing program 5: syz_execute_func(&(0x7f0000000180)="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") syz_execute_func(&(0x7f0000000300)="43dd250100000065d93457043adcb810100100939c9c430fe754e0000fd883af110000c4617d54d0f2e000450f7fd3c443f9df169ff326470f0f0a0d53440fc5ca4a4e0e8fe99099588d72dd66440f380561000f38c852bdea80b070c48179515965a1da804a4a450fde6706c3806ab23af30f11038fa1300f0f331cc4a13d73f6e66565f0f75397f21afaf51a74744540400f1b22") 07:55:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428d448cf820f4706031e75835813e13b954579822cabf5c49c204788c967997833ccbf197ef5fe6a6fa3b8cc8808fb8af13058263c1f576dad05236f15a8d4d9d46f05a2d510e430f553756fd3aae8cbbebac5f2ca2a3eb779f29b0a7fb6cffc073f9c9d76da64ca91814f1a08c83ab9c767b1f24c59ca4e1fe4e501d3e220cf8146fb7c4a"], 0x17a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:39 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, &(0x7f00000000c0)=""/94, 0x5e}, 0x0) syz_execute_func(&(0x7f0000000c40)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0bc4a3c1483194c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6443ff9e0080000036f04283a900800000202626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="3467d104463b7ec4286dcb93f310842e4c", 0x11}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 07:55:39 executing program 4: syz_execute_func(&(0x7f00000008c0)="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") syz_execute_func(&(0x7f0000000500)="43dd250100000065d93457043adcb81010010046f7dd9c66db440f0f7e03430fe754e0000fd883af110000c4617d54d0f2e000450f7fd391f326470f0f0a0d53440fc5ca4a4e0e8fe99099588d72dd660ff4160f38c852bdeac401a1dacddbe265a1da804a4a450fde6706c4c17d2fa703000000c4e16b7dd8f30f11038fa1300f0f331cc4a13d73f6e66565f0f75397f21afaf51a74744540400f1b22") 07:55:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:39 executing program 3: 07:55:39 executing program 4: syz_execute_func(&(0x7f0000000240)="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") pwritev(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f0000000080)="78cd28af0e19d7343a6f3445", 0xc}], 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eecec617d5a73228f097892312d2bbd000010c43c42192d1e9f9ffffff9c4c4c9a90f8d") syz_execute_func(&(0x7f0000000180)="96419cc4a2791dcd1c040f05c4e1705eeac4a37bf0c55c41e2e9c401e95dd684000f0fb8c40ff829014e4ec481a96296260000004b264ad80f41ad1e1e42a26167000000000000ff46c4274183259fa59d001ab527c4c22938544798c421dd5831e9e9e10bf866460f3a17c78c5b64660f38385a0a470f898c00000096fc26400f00a43902000000660f13a7120000004877f8460ff469d383397f5ee7e7fbfbabab8d73df0fc4227d21513a06662ad726660f73d30066400f642866f2ab440fec3f67dddda8e80fddf6c6c4665af72ec3c4e2899394000000199cc18f3e486e3e486ec4d61f8160160035ee0fc60fc6a8f2ae00f1ebeb628f1a7d9b6500f236f04283a9008000000066430f78c600005c455a91b7c4638d6e8df9ffff0c2323ffc4e3b16e9003330000a94acefb110fc4e251bcdf66440fd0be000000003aa2f1fbfb22c1e2") 07:55:39 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae087000000000e0f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) 07:55:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="2d012e2f67695d41e2fa8e88f79c23a9dc4d69148639068d12431a3ba48f89471561b05931484593fa6f5756b40a0ee977f39273e9135280ba0eb508353bf7f8052cdf18aa2995b9621786ab079040ed01b3706bb69142e9857abb3368d2445cd3512fe6975ec7554ae9d1d35ea0b767f115538892454c1ebc1d5ecd617d80a6c9a2"], 0x1) 07:55:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f12090000009bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="ac8ac6f99a83f3762554f99d4329f65901d9a43b86ba2f9b67db620e993377f583b3911f2b09fb4a565adb15f71806d2c4562b3e3a1ffdb621ca7b58cc7a5090fe4e004a2964ea3e1da248221388f9cfd3c0763a0200a8006ec7"], 0x5a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:39 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 07:55:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:40 executing program 1: syz_execute_func(&(0x7f0000000c40)="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") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)='4', 0x1}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 07:55:40 executing program 5: 07:55:40 executing program 3: socket$inet(0x10, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x20211, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x1, 0x0, &(0x7f0000000480)="f2"}) 07:55:40 executing program 4: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000001680)="43dd250100000065d93457043adcb810100100939c66440f7c7e03430fe754e0000fd883af110000c4617d54d0f2e00091f326470f0f0a0d53440fc5ca4a4e1e8fe99099588d72dd660ff4160f38c852bdea80b070c48179510f5f9800000000c4c2cd90acbca7ad4ac7460f0f22b0c3c4e16b7dd8f30f11038fa1300f0f331cc4a13d73f6e66565f0f75397f21afaf51a74744540400f1b22") 07:55:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c5"], 0x40}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:40 executing program 4: syz_execute_func(&(0x7f0000000240)="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") syz_execute_func(&(0x7f00000000c0)="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") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eecec617d5a73228f097892312d2bbd000010c43c42192d1e9f9ffffff9c4c4c9a90f8d") syz_execute_func(&(0x7f0000000180)="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") 07:55:40 executing program 1: syz_execute_func(&(0x7f0000000800)="96419cc4a2791dcd1c040f05c4e1705eeac4a37bf0c55c41e2e9c401e95dd684000f0fb8c40ff829014e4ec481a96296260000004b264ad80f41ad1e1e42a26167000000000000ff46c4274183259fa59d001ab527c4c22938544798c421dd5831e9e9e10bf866460f3a17c78c5b64660f38385a0a470f898c00000096fc26400f00a43902000000660f13a7120000004877f8460ff469d383397f5ee7e7fbfbabab8d73df0fc4227d21513a06662ad726660f73d30066400f642866f2ab440fec3f67dddda8e80fddf6c6c4665af72ec3c4e2899394000000199cc18f3e486e3e486ec4d61f8160160035ee0fc60fc6a8f2ae00f1ebeb628f1a7d9b6500f236f04283a9008000000066430f78c600005c455a91b7c4638d6e8df9ffff0c2323ffc4e3b16e9003330000a94acefb110fc4e251bcdf66440fd0be000000003aa2f1fbfb22c1e2") syz_execute_func(&(0x7f0000000040)="43dd250100000065d93457043a939c9c430fe754e0000fd883af110000c4617d54d0f2e0000f7fdbbb91f326470f0f0a0d53440fc5ca4a4e0e8fe99099588df2dd66440f380561000f38c852bdea80b070c48179515965a1da804a4a450fde6706c3806ab23af30f11038fa1300f0f331cc4a13d73f6e66565f0f75397f21afaf51a74744540400f1b22") 07:55:40 executing program 3: socket$inet(0x10, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x20211, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x1, 0x0, &(0x7f0000000480)="f2"}) 07:55:40 executing program 4: 07:55:40 executing program 1: 07:55:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:41 executing program 5: 07:55:41 executing program 1: 07:55:41 executing program 4: 07:55:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:41 executing program 5: 07:55:41 executing program 4: 07:55:41 executing program 1: 07:55:41 executing program 3: socket$inet(0x10, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x20211, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x1, 0x0, &(0x7f0000000480)="f2"}) 07:55:41 executing program 4: 07:55:41 executing program 5: 07:55:41 executing program 1: 07:55:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:42 executing program 4: 07:55:42 executing program 5: 07:55:42 executing program 1: 07:55:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:42 executing program 5: 07:55:42 executing program 4: 07:55:42 executing program 1: 07:55:42 executing program 3: socket$inet(0x10, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x20211, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x1, 0x0, &(0x7f0000000480)="f2"}) 07:55:42 executing program 1: 07:55:42 executing program 5: 07:55:42 executing program 4: 07:55:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:42 executing program 1: 07:55:42 executing program 5: 07:55:42 executing program 4: 07:55:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:43 executing program 4: 07:55:43 executing program 1: 07:55:43 executing program 5: 07:55:43 executing program 3: 07:55:43 executing program 5: 07:55:43 executing program 1: 07:55:43 executing program 4: 07:55:43 executing program 5: 07:55:43 executing program 3: 07:55:43 executing program 4: 07:55:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x7f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:43 executing program 1: 07:55:43 executing program 3: 07:55:43 executing program 5: 07:55:43 executing program 4: syz_execute_func(&(0x7f0000000180)="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") syz_execute_func(&(0x7f0000000300)="43dd250100000065d93457043adcb810100100939c9c430fe754e0000fd883b9b90000c4617d54d0f2e000450f7fd391f326470f0f0a0d534e0e8fe99099588d72dd66440f380561000f38c852bdea80b070c48179515965a1da804a4a450fde6706c3806ab23ac4c27959e78f660f3a61c40f73f6e66565f0f75397f21afaf51a747445") 07:55:44 executing program 1: 07:55:44 executing program 5: 07:55:44 executing program 3: 07:55:44 executing program 1: 07:55:44 executing program 4: 07:55:44 executing program 5: 07:55:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000004}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:44 executing program 1: 07:55:44 executing program 3: 07:55:44 executing program 4: 07:55:44 executing program 5: 07:55:44 executing program 4: 07:55:44 executing program 1: syz_execute_func(&(0x7f0000000c40)="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") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="3467d104463b7ec4286dcb93f310842e4c9770c4ebc33412ecfaf30dbd95e18f4ead04", 0x23}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 07:55:44 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000100)="43dd25210000006565d93457c4e3f12145b23303e31c55e64993d04b4bf30f122d2bbd00000f3a0f30e1c1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d45157501d2be2d65946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428d448cf820f4706031e75835813e13b954579822cabf5c49c204788c967997833ccbf197ef5fe6a6fa3b8cc8808fb8af13058263c1f576dad05236f15a8d4d9d46f05a2d510e430f553756fd3aae8cba7bac5f2ca2a3eb779f29b0a7fb6cffc073f9c9d76da64ca91814f1a08c83ab9c767b1f24c59ca4ef5e4e501d3e220cf8146fb7c4a4726a97cd02b93c47222218804eebd1795e9a389f75da01498ff1e648773fb5f475018227e3181a51afc21c91c266668868d18242d62acd0c19e46a20d7e2579880633802e262c359e3a2937675d237339e1abeb27f4ae33d12ffeccb69618e6000356b856433cc859be20e7de9b899d21a99a04c5559a40cfa7ecb449df5412ed2a6fc6f5b8d6d16d81e8474d47ea907603135c43f58f8940fe3fecb80e4b03c63159f827ad5aa2c7cd90bde569cd757832446fa385df7c2202b835c30b1d337b42790ba5e9beb9d4d3b8806e2e978b5db841aff85e17cf8d73874f436bc76f336c123a7cf67e3992ae8f0645bb88d41b9437ce7593451437a1be6b7208faafad77d91ea449f7421228b7d8883e072c2abaaf80681038e15b69e0c7f4868f0cd115fd2607f0f5305114595e04359350c6b0580c5311c4dc7f89c86d3184d9fc1f9cc0250968bad83cc9ae7fa8081a6f47ca9eb7b4697b9c70af9277933c3881ff5fbc5a7264038ce11f170c24009d9d3113fa537207baacf105949e4ee99074bc199acd0b9c14fc63e77a6f54f90584779ac5d7e88ac1fbbd09f880d91c25c77570f42a7c1e6e718c40a7591ae419d5ff1cd0362fa4c9fb7ead87ea540ccfe69565abac2a4a3fd7e1090cdba043c3487c291a6d17cdb50e4ec6e7b0c437527cdecf3fe6e03727ecbb1c0284466431d782dd35c306428e3880379de2c4f47301e5d498035abd0b7a92da78aacfbf91a8ce711ab8cbedfbf4a10665c29eaa0b0ddb0c6c8ab1037c8d"], 0x3a2}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:45 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)="24000000220007031dfffd946fa2830002200a0009000300741d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 07:55:45 executing program 4: 07:55:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:45 executing program 1: 07:55:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000000000000c}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)) 07:55:45 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1) syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057f3de99f73d000033b8c4f4014e4e4e5b4b264ad80f41ad1e1edee50946c42741839fa59d0000b527854607c421dd5831e9e9e10bf8c45b64660f38385a0a470f898c00000096ea26400f00a43902000000ed480277f8f8440ff4697683397fd3fb8f4894a2c92c05b57d215104662ad726660f73d30066400f64287c7c66f2ab440fec3f67dddda8e80fddf6c6c466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b660fe4bb46739a48c4414e53d2c4c1fc518ce00ce6fa2cc6a8f2ae000000f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba49c45c455a91b7c4638d6e8df9ffffff2323ffff410f4acefbc423f96c20ecc4e251bcdfb83aa2f1fbfb22c1e2") syz_execute_func(&(0x7f0000000100)="43dd25210000006565d93457c4e3f12145b23303e31c55e64993d04b4bf30f122d2bbd00000f3a0f30e1c1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:45 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="385d4b126b64f104cb2ae19f9dddf41ca46c7a03aa6229455cd4dc4766d5be68cce4c66df2093e8e3312500b14", 0x2d}], 0x1) syz_execute_func(&(0x7f00000001c0)="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") writev(0xffffffffffffffff, &(0x7f0000001440)=[{&(0x7f00000000c0)="17c8b4dbff6eba00a1ab938e90cafc5586809b", 0x13}], 0x1) syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00000f3a0f30e1c1c22e2e664f0f38f657fed1a7f0425783c4c4ad2b2b") 07:55:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, 0x0) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock, 0x80) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:55:45 executing program 4: syz_execute_func(&(0x7f0000000b00)="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") writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="154c7bea7e04b9963dfe8f31", 0xc}], 0x1) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:55:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$VT_SETMODE(r0, 0x5602, 0x0) 07:55:45 executing program 5: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 07:55:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000c00}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:46 executing program 4: syz_execute_func(&(0x7f0000000c40)="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") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="3467d104463b7e", 0x7}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 07:55:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 07:55:46 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) 07:55:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x8000000000000006, 0x0, 0x0, 0x50000}]}) r0 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 07:55:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1bc}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000002000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:46 executing program 5: 07:55:46 executing program 1: 07:55:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000003f00}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c586"], 0x41}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:46 executing program 3: syz_execute_func(&(0x7f0000000c40)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0bc4a3c1483194c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6443ff9e0080000036f04283a900800000202626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="3467d104463b7ec4286dcb93f310842e4c", 0x11}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 07:55:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x22a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:55:47 executing program 3: 07:55:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x174, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x130, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 07:55:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:47 executing program 4: 07:55:47 executing program 5: 07:55:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000004000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:47 executing program 5: 07:55:47 executing program 3: 07:55:47 executing program 4: 07:55:47 executing program 3: 07:55:47 executing program 5: 07:55:47 executing program 1: 07:55:47 executing program 4: 07:55:47 executing program 3: 07:55:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000000000ff03}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:48 executing program 5: 07:55:48 executing program 1: 07:55:48 executing program 4: 07:55:48 executing program 3: 07:55:48 executing program 1: 07:55:48 executing program 3: 07:55:48 executing program 5: 07:55:48 executing program 4: 07:55:48 executing program 4: 07:55:48 executing program 5: 07:55:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:49 executing program 3: 07:55:49 executing program 1: 07:55:49 executing program 4: 07:55:49 executing program 5: 07:55:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000000101d0}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:49 executing program 4: 07:55:49 executing program 3: 07:55:49 executing program 1: 07:55:49 executing program 5: 07:55:49 executing program 3: 07:55:49 executing program 1: 07:55:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:50 executing program 4: 07:55:50 executing program 5: 07:55:50 executing program 1: 07:55:50 executing program 3: 07:55:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000040000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:50 executing program 4: 07:55:50 executing program 3: 07:55:50 executing program 1: 07:55:50 executing program 5: 07:55:50 executing program 1: 07:55:50 executing program 3: 07:55:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:51 executing program 4: 07:55:51 executing program 5: 07:55:51 executing program 1: 07:55:51 executing program 3: 07:55:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000200000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:51 executing program 4: 07:55:51 executing program 3: 07:55:51 executing program 5: 07:55:51 executing program 1: 07:55:51 executing program 5: 07:55:51 executing program 3: 07:55:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:52 executing program 1: 07:55:52 executing program 4: 07:55:52 executing program 5: 07:55:52 executing program 3: 07:55:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000f0ff7f}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:52 executing program 4: 07:55:52 executing program 5: 07:55:52 executing program 3: 07:55:52 executing program 1: 07:55:52 executing program 5: 07:55:52 executing program 4: 07:55:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6900000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:53 executing program 3: 07:55:53 executing program 1: 07:55:53 executing program 5: 07:55:53 executing program 4: 07:55:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000001000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:53 executing program 3: 07:55:53 executing program 1: 07:55:53 executing program 4: 07:55:53 executing program 5: 07:55:53 executing program 3: 07:55:53 executing program 1: 07:55:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:54 executing program 4: 07:55:54 executing program 5: 07:55:54 executing program 3: 07:55:54 executing program 1: 07:55:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000000c000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:54 executing program 3: 07:55:54 executing program 5: 07:55:54 executing program 4: 07:55:54 executing program 1: 07:55:54 executing program 4: 07:55:54 executing program 5: 07:55:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6b00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:54 executing program 3: 07:55:54 executing program 1: 07:55:54 executing program 4: 07:55:54 executing program 5: 07:55:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000003f000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:55 executing program 4: 07:55:55 executing program 5: 07:55:55 executing program 1: 07:55:55 executing program 3: 07:55:55 executing program 4: 07:55:55 executing program 1: 07:55:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:55 executing program 5: 07:55:55 executing program 3: 07:55:55 executing program 4: 07:55:55 executing program 1: 07:55:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000040000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:56 executing program 3: 07:55:56 executing program 5: 07:55:56 executing program 4: 07:55:56 executing program 1: 07:55:56 executing program 3: 07:55:56 executing program 5: 07:55:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:56 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/94, 0x5e}, 0x0) syz_execute_func(&(0x7f0000000c40)="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") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 07:55:56 executing program 1: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73f3dbab3b000000085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31ffffff07070f71cd20") 07:55:56 executing program 5: syz_execute_func(&(0x7f0000000240)="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") syz_execute_func(&(0x7f0000000480)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3afc46149d4d4c46159f42d5f83a063") 07:55:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000540), 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000600)={0x7, {{0x2, 0x4e22, @loopback}}, 0x1, 0x4, [{{0x2, 0x4e20, @empty}}, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}}, {{0x2, 0x4e20, @remote}}]}, 0x290) 07:55:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000007ffff000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000000c000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000f0ff7f}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000200000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000d0010100}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6e00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000effdffff}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000f5ffffff}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x5400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000ff030000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4d00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000fffffdef}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x4600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000ffffff7f}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x6f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:55:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3c00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:56:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c5864183bb5548c886210899d6b5b6d5efc576ff"], 0x47}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:56:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000fffffff5}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:56:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:56:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3a00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:56:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x7000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:56:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x3800000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:56:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x4}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:56:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de04"], 0x1f}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:56:59 executing program 1: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f18065742b50f1c18c7decc142d507a60eb688c34982820c5a9fd797"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{0x0, 0x7fff}, {0x6}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 07:56:59 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:56:59 executing program 1: syz_execute_func(&(0x7f00000004c0)="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") setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="7f00001400bb00000000000000000000000000000000000000000000185e25cf866ac088a0a07b8f325069dc161db9186c3ab0a8b335d2"], 0x1) syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 07:56:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da319"], 0x3e}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 1512.646931][T16847] IPVS: ftp: loaded support on port[0] = 21 [ 1512.722811][T16847] chnl_net:caif_netlink_parms(): no params data found [ 1512.753601][T16847] bridge0: port 1(bridge_slave_0) entered blocking state [ 1512.760826][T16847] bridge0: port 1(bridge_slave_0) entered disabled state [ 1512.769085][T16847] device bridge_slave_0 entered promiscuous mode [ 1512.777870][T16847] bridge0: port 2(bridge_slave_1) entered blocking state [ 1512.785266][T16847] bridge0: port 2(bridge_slave_1) entered disabled state [ 1512.793447][T16847] device bridge_slave_1 entered promiscuous mode [ 1512.810432][T16847] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1512.820833][T16847] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1512.840434][T16847] team0: Port device team_slave_0 added [ 1512.847991][T16847] team0: Port device team_slave_1 added [ 1512.914061][T16847] device hsr_slave_0 entered promiscuous mode [ 1512.961328][T16847] device hsr_slave_1 entered promiscuous mode [ 1513.011528][T16847] bridge0: port 2(bridge_slave_1) entered blocking state [ 1513.018587][T16847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1513.025988][T16847] bridge0: port 1(bridge_slave_0) entered blocking state [ 1513.033136][T16847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1513.070094][T16847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1513.084462][T10148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1513.092788][T10148] bridge0: port 1(bridge_slave_0) entered disabled state [ 1513.100296][T10148] bridge0: port 2(bridge_slave_1) entered disabled state [ 1513.108759][T10148] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1513.121595][T16847] 8021q: adding VLAN 0 to HW filter on device team0 [ 1513.132254][T28375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1513.140604][T28375] bridge0: port 1(bridge_slave_0) entered blocking state [ 1513.147695][T28375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1513.162001][T10148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1513.170281][T10148] bridge0: port 2(bridge_slave_1) entered blocking state [ 1513.177379][T10148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1513.192824][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1513.201505][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1513.214411][T29955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1513.229237][T16847] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1513.241024][T16847] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1513.253065][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1513.261975][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1513.270156][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1513.290842][T16847] 8021q: adding VLAN 0 to HW filter on device batadv0 07:57:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x7100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:57:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x123}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:57:00 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:57:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x10) semget(0x1, 0x1, 0x1) semget(0x0, 0x2, 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xfff}, 0x8) 07:57:00 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:57:00 executing program 1: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f18065742b50f1c18c7decc142d507a60eb688c34982820c5a9fd797ca74"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{0x0, 0x7fff}, {0x6}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") [ 1513.496841][T16866] IPVS: ftp: loaded support on port[0] = 21 [ 1535.921928][ T36] device bridge_slave_1 left promiscuous mode [ 1535.928129][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 1535.981901][ T36] device bridge_slave_0 left promiscuous mode [ 1535.988197][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 1536.143243][ T36] device hsr_slave_1 left promiscuous mode [ 1536.214260][ T36] device hsr_slave_0 left promiscuous mode [ 1536.275002][ T36] team0 (unregistering): Port device team_slave_1 removed [ 1536.286549][ T36] team0 (unregistering): Port device team_slave_0 removed [ 1536.297424][ T36] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1536.335665][ T36] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1536.419739][ T36] bond0 (unregistering): Released all slaves 07:57:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xc}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:57:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997d5864183bb5548c8d5210899d6b5b6d5efcd76ffd0"], 0x53}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:57:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x118, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 07:57:58 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:57:58 executing program 3: syz_execute_func(&(0x7f0000000340)="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") syz_execute_func(&(0x7f00000002c0)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffffc4f20f2d07ad9a0f") 07:57:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x7200000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:57:58 executing program 3: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) [ 1571.747713][T16886] IPVS: ftp: loaded support on port[0] = 21 07:57:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002e80)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000002ec0), 0xfeb4, 0x0, 0x0, 0xfffffdb1) 07:57:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x2000000016, 0x249e21, 0x100000001}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000197000/0x10000)=nil, 0x10000, 0xffffffffefffffff, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000002c0), 0x0}, 0x20) 07:57:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c5864183bb5548c886210899"], 0x3f}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:57:59 executing program 1: syz_execute_func(&(0x7f00000004c0)="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") openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_emit_ethernet(0x37, &(0x7f0000000040)={@remote, @remote, [{}], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x1, 0x0, @empty, '?', @empty, "42a6a7a624255848e94c270bec1afe96"}}}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 07:57:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f124c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr-camellia-aesni,nhpoly1305-generic)\x00'}, 0x58) [ 1573.455877][T16928] IPVS: ftp: loaded support on port[0] = 21 [ 1573.620252][T16928] chnl_net:caif_netlink_parms(): no params data found [ 1573.697890][T16928] bridge0: port 1(bridge_slave_0) entered blocking state [ 1573.709390][T16928] bridge0: port 1(bridge_slave_0) entered disabled state [ 1573.725064][T16928] device bridge_slave_0 entered promiscuous mode [ 1573.738030][T16928] bridge0: port 2(bridge_slave_1) entered blocking state [ 1573.748736][T16928] bridge0: port 2(bridge_slave_1) entered disabled state [ 1573.765025][T16928] device bridge_slave_1 entered promiscuous mode [ 1573.805382][T16928] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1573.827341][T16928] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1573.868491][T16928] team0: Port device team_slave_0 added [ 1573.884412][T16928] team0: Port device team_slave_1 added [ 1573.983304][T16928] device hsr_slave_0 entered promiscuous mode [ 1574.041138][T16928] device hsr_slave_1 entered promiscuous mode [ 1574.104790][T16928] bridge0: port 2(bridge_slave_1) entered blocking state [ 1574.111938][T16928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1574.119340][T16928] bridge0: port 1(bridge_slave_0) entered blocking state [ 1574.126514][T16928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1574.179513][T16928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1574.195715][ T9010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1574.204928][ T9010] bridge0: port 1(bridge_slave_0) entered disabled state [ 1574.213822][ T9010] bridge0: port 2(bridge_slave_1) entered disabled state [ 1574.223795][ T9010] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1574.238786][T16928] 8021q: adding VLAN 0 to HW filter on device team0 [ 1574.252354][ T9010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1574.262069][ T9010] bridge0: port 1(bridge_slave_0) entered blocking state [ 1574.269153][ T9010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1574.281187][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1574.289702][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1574.296880][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1574.321161][T10148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1574.343963][T10148] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1574.359976][T10148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1574.386661][ T9010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1574.395729][ T9010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1574.405998][T16928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1574.426684][T16928] 8021q: adding VLAN 0 to HW filter on device batadv0 07:58:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xc00}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:02 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x20002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) syz_execute_func(&(0x7f00000001c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e3c461f92bbbc2000000c442019dcc6f") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x2}, 0x20) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="846ad230262867ed84d105b31ed776a6"}, 0x1c) 07:58:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48"], 0x1d}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x64}}, 0x0) syz_execute_func(&(0x7f0000000280)="91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:58:02 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x7300000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x50, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x50}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 1575.327551][T16941] IPVS: ftp: loaded support on port[0] = 21 07:58:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95eeaaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4430fae9f5b672f495cc100") 07:58:02 executing program 1: clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000200)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) msgctl$IPC_RMID(r2, 0x0) 07:58:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, 0x0, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semget(0x1, 0x0, 0x0) semget(0x0, 0x0, 0x0) 07:58:02 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}, @in6={0xa, 0x0, 0x0, @remote}}}, 0x118) 07:58:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000057c0)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000280)='io'}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005800), &(0x7f0000005840)=0xc) sendmsg$netlink(r1, &(0x7f0000006fc0)={&(0x7f0000000240)=@proc={0x10, 0x0, 0x25dfdbfe, 0x1030100}, 0xc, &(0x7f0000006f40)=[{&(0x7f0000006bc0)={0xac, 0x36, 0x20, 0x70bd2d, 0x25dfdbfe, "", [@generic="5080a3afee265894f9e103cf3cda3df7895532735bdb701aae1755946766494fee9d37cb2e2c26865014c205bf276ae8583d1f625863bf8f836cc52945cff8c245516ee6fea293f64356c8704a63e249c96e8d433a42f1fa276bcc5486a5a17cbaca27dbaf4c58e426e54f2bd8fffd8e1afff51c7cfcf229de8ad5931147b6b086a9d4e1c03cec064697023bfd600521b3679e06c193c2aeeaac"]}, 0xac}], 0x1, 0x0, 0x0, 0x20000000}, 0x81) r2 = openat$cgroup_ro(r1, &(0x7f0000007040)='memory.swap.\xff\x03\x00\x00\x00\x80\x00\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000000440)=""/222, 0xde, 0x10002, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x9}, 0x1c) write$cgroup_subtree(r0, &(0x7f00000002c0)={[{0x2f, 'pids'}, {0x2b, 'rdma'}, {0x2b, 'pids'}, {0x2d, 'cpu'}, {0x2b, 'rdma'}, {0x2d, 'io'}, {0x2b, 'memory'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}]}, 0x33) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000007000)=r3, 0x4) recvmmsg(r2, &(0x7f0000005680)=[{{&(0x7f0000000300)=@can, 0x80, &(0x7f0000000740)=[{&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000000580)=""/136, 0x88}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f0000000640)=""/252, 0xfc}], 0x6, &(0x7f00000007c0)=""/69, 0x45}}, {{&(0x7f0000000840)=@ax25={{0x3, @netrom}, [@netrom, @netrom, @bcast, @null, @default, @null, @null, @netrom]}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000008c0)=""/187, 0xbb}, {&(0x7f0000000980)=""/202, 0xca}, {&(0x7f0000000a80)=""/241, 0xf1}, {&(0x7f0000004c80)=""/251, 0xfb}], 0x4, &(0x7f0000000b80)=""/184, 0xb8}, 0x4}, {{&(0x7f0000004d80)=@l2, 0x80, &(0x7f0000005180)=[{&(0x7f0000004e00)=""/169, 0xa9}, {&(0x7f0000004ec0)=""/113, 0x71}, {&(0x7f0000004f40)=""/61, 0x3d}, {&(0x7f0000004f80)=""/238, 0xee}, {&(0x7f0000005080)=""/247, 0xf7}], 0x5, &(0x7f0000005200)=""/78, 0x4e}, 0xffffff8000000000}, {{&(0x7f0000005280)=@un=@abs, 0x80, &(0x7f0000005600)=[{&(0x7f0000005300)=""/162, 0xa2}, {&(0x7f00000053c0)=""/62, 0x3e}, {&(0x7f0000005400)=""/33, 0x21}, {&(0x7f0000005440)=""/181, 0xb5}, {&(0x7f0000005500)=""/31, 0x1f}, {&(0x7f0000005540)=""/52, 0x34}, {&(0x7f0000005580)=""/95, 0x5f}], 0x7}, 0x8c6}], 0x4, 0x10002, &(0x7f0000005780)={0x77359400}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) recvmmsg(r4, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) 07:58:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x2000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x4, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semget(0xffffffffffffffff, 0x2, 0x0) 07:58:03 executing program 1: syz_execute_func(&(0x7f0000000b00)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa024800570033b8c4f4014e4e4e5b80c70030091e1edee509c421045f4607c421dd5831c4e10bf8c45b8f4868cd2e2a470f898c000000c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c166f663000000c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000540)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8460f3a0f5900f1f30f022d2bbd0020c4c16973da00653e0f212dd5d5f047fe837507dec60ca7fd31fffff50f71cd30") 07:58:03 executing program 1: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) 07:58:03 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x7400000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) 07:58:03 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000100)="39c9132085fb253a4fb9f5090c97cb", 0xf}], 0x1) syz_execute_func(&(0x7f00000004c0)="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") pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="12a5085f3ab2d01f98fe5b9af5e077c6ca22913fb2c03df0f9948b102623317e05cfcc51c6346f0900c20916133ca8f059a88c173191531a64a3be1b", 0x3c}], 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000140)={@loopback, @broadcast, 0x1}, 0x10) syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 07:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) semget(0x1, 0x0, 0x0) [ 1576.791537][T17015] IPVS: ftp: loaded support on port[0] = 21 07:58:04 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") syz_emit_ethernet(0x33, &(0x7f0000000040)={@remote, @remote, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x1, 0x0, @empty, '?', @empty, "42a6a7a624255848e94c270bec1afe96"}}}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 07:58:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 07:58:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x228}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x3f00}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:04 executing program 4: syz_execute_func(&(0x7f0000000b00)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa024800570033b8c4f4014e4e4e5b80c70030091e1edee509c421045f4607c421dd5831c4e10bf8c45b8f4868cd2e2a470f898c000000c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c166f663000000c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000f9"], 0x1, 0x0}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd00002ff9653e0f21aad5d5e3e50ca742c0137a31ffe3ffd407b80f71cd30") 07:58:04 executing program 3: syz_execute_func(&(0x7f00000004c0)="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") syz_emit_ethernet(0x36, &(0x7f0000000040)={@remote, @remote, [{}], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @empty, "42a6a7a624255848e94c270bec1afe96"}}}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 07:58:04 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window={0x3, 0x0, 0x7}, @timestamp, @timestamp], 0x5) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)) ioctl$int_in(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{0x0}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:58:05 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:05 executing program 3: syz_execute_func(&(0x7f00000000c0)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660f380a0e000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed8fe8189ff2bb4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b8f0001c1cdfe01c1cdfed2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000bac749c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f18065742b50f1c18c7decc142d507a60eb688c3"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{0x0, 0x7fff}, {0x6}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 07:58:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa2"], 0x28}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x7500000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:05 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window={0x3, 0x0, 0x7}, @timestamp, @timestamp], 0x5) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)) ioctl$int_in(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{0x0}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:58:05 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/video0\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 07:58:05 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window={0x3, 0x0, 0x7}, @timestamp, @timestamp], 0x5) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)) ioctl$int_in(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{0x0}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:58:05 executing program 1: syz_execute_func(&(0x7f0000000100)="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") pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="12a5085f3ab2d01f98fe599af5e0771246f37ae03512e048c6ca22913fb2c03df0f9948b102623317e05cfcc51c6346f0900c20916133ca8f059a8", 0x3b}], 0x1, 0x0) syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e64993fcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0a90683c4c4a7f8") [ 1578.398416][T17179] IPVS: ftp: loaded support on port[0] = 21 07:58:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x4000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:05 executing program 3: syz_execute_func(&(0x7f0000000b00)="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") syz_execute_func(&(0x7f0000000140)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31a1ffe2ffe207070f71cd30") 07:58:05 executing program 1: syz_execute_func(&(0x7f0000000100)="964a19e9c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ea74b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096a4ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79ceb066b1f72ec3c4e2899294d80000000019c2c4817f1287f613788a0b0b0000c4414e53d2c58160160fc60fc6a8f2ae000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d1d4b000000c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e64993fcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0a90683c4c4a7f8") 07:58:05 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x8000) 07:58:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x10) semget(0x1, 0x1, 0x0) semget(0x1, 0x0, 0x120) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xfff}, 0x8) 07:58:06 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window={0x3, 0x0, 0x7}, @timestamp, @timestamp], 0x5) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)) ioctl$int_in(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{0x0}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:58:06 executing program 3: syz_execute_func(&(0x7f0000000b00)="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") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000f9bbda49bf558f053e"], 0x1, 0x0}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:58:06 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x7600000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:06 executing program 3: syz_execute_func(&(0x7f00000004c0)="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") openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@remote, @remote, [{}], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @empty, "42a6a7a624255848e94c270bec1afe96"}}}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 07:58:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) [ 1579.553831][T17391] IPVS: ftp: loaded support on port[0] = 21 07:58:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xff03}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:06 executing program 3: syz_execute_func(&(0x7f0000000b00)="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") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000f9bbda49bf558f053e"], 0x1, 0x0}, 0x0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:58:07 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) kexec_load(0x1, 0x0, &(0x7f0000000580), 0x0) 07:58:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x148}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000380), 0xfef6) write$smack_current(r1, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c9975842400f5e0166420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r1, 0x0, 0x0, 0x3ffffff, 0x0, 0xfffffffffffffebe) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000100)="c6980ef6", 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 07:58:07 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x7700000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x120, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 07:58:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x101d0}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) [ 1580.882472][T17785] IPVS: ftp: loaded support on port[0] = 21 07:58:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:08 executing program 1: syz_execute_func(&(0x7f0000000880)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d934573666470f148787cd0000400f0112e89afc677f71c4c1c2c2e610653e0f01d5c4e3e50ca7fdd9ffff0f660f71cd24") 07:58:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x4, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x2, 0x0) 07:58:08 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x10) 07:58:10 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x40000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000004}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:10 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:10 executing program 1: syz_execute_func(&(0x7f00000004c0)="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") openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000040)={@remote, @remote, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @empty, "42a6a7a624255848e94c270bec1afe96"}}}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 07:58:11 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) [ 1583.840181][T17825] IPVS: ftp: loaded support on port[0] = 21 07:58:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774b946745447029403b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53aac17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77a6cb16d55331b541e132fb8529af19992c67650e6c1a5d3475378d27a85ac7bc8e4a59e7068f846977a5fbabeb59dc0dd08e3e072ba0bddb4ba0e88a457aa836aef0dfd63c5c281734943949ee861e388d5540c1bb69e84f4747e8ab40a715ac59642329a2b04ff98079d67a92083406f9c851a59692e6cb482cbd74c9bc82c80a50ab1a9baa9a146e39b5c2f9753c18e2fb6c9078a8d6d787dfbd21351297825689562a87fba8191075a0a11fa9be1288dcf5947da9d82ba5cb7393effc2ab661d4116270c9e026c59348b16bd3bf1209f6b4dad708a56be827de80c4c68a235a1daa0296485af4890526eb28568b2e506f42cfb35e8f115dc0763b8aa98b3b9f564d55d9695f3f2e025d99ffd73a35b3d5e142e1991ca49ff373683214d0ea01f1232d85418035d631c9c7e6794ebc0dd7f6fd2b04df851151d1af5e940c3f02df5085d4599974918a255e2cb82075e1297dc6832c1ac3bb3fd58726aab34073a90e0617ceb8a9"], 0x227}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000000000000c}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, 0x0, 0x0) 07:58:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x200000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x10) semget(0xffffffffffffffff, 0x1, 0x1) semget(0x0, 0x2, 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xfff}, 0x8) 07:58:12 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0x1, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0x8) semget(0x1, 0x0, 0x120) 07:58:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000c00}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) [ 1585.077455][T18296] IPVS: ftp: loaded support on port[0] = 21 07:58:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:12 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") syz_emit_ethernet(0x37, &(0x7f0000000040)={@remote, @remote, [{}], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x1, 0x0, @empty, '?', @empty, "42a6a7a624255848e94c270bec1afe96"}}}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 07:58:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000004000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf0ff7f}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997d5864183bb5548c8d5210899d6b5b6d5efcd76ff"], 0x52}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:13 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:13 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") syz_emit_ethernet(0x32, &(0x7f0000000040)={@remote, @remote, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @empty, "42a6a7a624255848e94c270bec1afe96"}}}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 07:58:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961518f", 0x21) 07:58:13 executing program 1: syz_execute_func(&(0x7f00000004c0)="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") setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="7f00001400bb00000000000000000000000000000000000000000000185e25cf866ac088a0a07b8f325069dc161db9186c3ab0a8b335d2d7047aa249a73bd35f8d"], 0x1) syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 07:58:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000000000ff03}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 07:58:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da31997c5864183bb5548c8862108"], 0x3e}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 1586.387619][T18771] IPVS: ftp: loaded support on port[0] = 21 07:58:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) 07:58:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 07:58:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000000101d0}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x1000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 07:58:14 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r2, 0x800000000000937c, 0x0) 07:58:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semget(0x1, 0x4, 0x0) 07:58:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) 07:58:14 executing program 5: unshare(0x6c060000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000040000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) [ 1587.395560][T19206] IPVS: ftp: loaded support on port[0] = 21 07:58:14 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp, @timestamp], 0x6) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:58:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) 07:58:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000f0ff7f}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b5593", 0x11) 07:58:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xc000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:15 executing program 4: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) sendfile(r0, r0, 0x0, 0x2000000000010000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {0x77359400}, 0x80, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x9) r5 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffff9}) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f00000005c0)='nbd\x00') pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1000000) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x24044814, 0x0, 0x356) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000300)={0x4, 0x80000000, 0x7, 0x8, 0xc, 0x9cb}) 07:58:15 executing program 5: unshare(0x6c060000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x17b}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b5593", 0x11) 07:58:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000001000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1588.162233][T19614] IPVS: ftp: loaded support on port[0] = 21 07:58:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b5593", 0x11) [ 1588.294153][T19615] bridge0: port 2(bridge_slave_1) entered disabled state [ 1588.301880][T19615] bridge0: port 1(bridge_slave_0) entered disabled state 07:58:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8", 0x19) 07:58:15 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) 07:58:15 executing program 4: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) sendfile(r0, r0, 0x0, 0x2000000000010000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {0x77359400}, 0x80, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x9) r5 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffff9}) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f00000005c0)='nbd\x00') pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1000000) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x24044814, 0x0, 0x356) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000300)={0x4, 0x80000000, 0x7, 0x8, 0xc, 0x9cb}) 07:58:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8", 0x19) 07:58:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x10) semget(0x1, 0x1, 0x1) semget(0x0, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xfff}, 0x8) [ 1588.930357][T19845] device bridge_slave_1 left promiscuous mode [ 1588.941306][T19845] bridge0: port 2(bridge_slave_1) entered disabled state [ 1589.030700][T19845] device bridge_slave_0 left promiscuous mode [ 1589.048550][T19845] bridge0: port 1(bridge_slave_0) entered disabled state 07:58:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x3f000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000000c000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:16 executing program 5: unshare(0x6c060000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8", 0x19) [ 1589.155404][T19964] IPVS: ftp: loaded support on port[0] = 21 07:58:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a", 0x1d) 07:58:16 executing program 4: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) sendfile(r0, r0, 0x0, 0x2000000000010000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {0x77359400}, 0x80, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x9) r5 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffff9}) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f00000005c0)='nbd\x00') pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1000000) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x24044814, 0x0, 0x356) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000300)={0x4, 0x80000000, 0x7, 0x8, 0xc, 0x9cb}) 07:58:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a", 0x1d) 07:58:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000040000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:16 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a", 0x1d) 07:58:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961", 0x1f) 07:58:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x2, 0x0, "8b63e98a6e9a990ceacccaa0722f7b17adbfb251c09e5993d319d88199f6923e646c1d3eaad49bc3c0a86bd1683c51ec36b5d2dab5a220e04e0b20637e2b5a8dd3403bbe1ccf681d083e2307d3f5597b"}, 0xd8) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, 0x0, 0x0) 07:58:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x40000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d45157501d2be2d65946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428d448cf820f4706031e75835813e13b954579822cabf5c49c204788c967997833ccbf197ef5fe6a6fa3b8cc8808fb8af13058263c1f576dad05236f15a8d4d9d46f05a2d510e430f553756fd3aae8cba7bac5f2ca2a3eb779f29b0a7fb6cffc073f9c9d76da64ca91814f1a08c83ab9c767b1f24c59ca4ef5e4e501d3e220cf8146fb7c4a4726a97cd02b93c47222218804eebd1795e9a389f75da01498ff1e648773fb5f475018227e3181a51afc21c91c266668868d18242d62acd0c19e46a20d7e2579880633802e262c359e3a2937675d237339e1abeb27f4ae33d12ffeccb69618e6000356b856433cc859be20e7de9b899d21a99a04c5559a40cfa7ecb449df5412ed2a6fc6f5b8d6d16d81e8474d47ea907603135c43f58f8940fe3fecb80e4b03c63159f827ad5aa2c7cd90bde569cd757832446fa385df7c2202b835c30b1d337b42790ba5e9beb9d4d3b8806e2e978b5db841aff85e17cf8d73874f436bc76f336c123a7cf67e3992ae8f0645bb88d41b9437ce7593451437a1be6b7208faafad77d91ea449f7421228b7d8883e072c2abaaf80681038e15b69e0c7f4868f0cd115fd2607f0f5305114595e04359350c6b0580c5311c4dc7f89c86d31"], 0x2b7}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961", 0x1f) 07:58:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x800000007ffff000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428"], 0xf6}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a0961", 0x1f) 07:58:17 executing program 1: syz_execute_func(&(0x7f00000004c0)="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") openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_emit_ethernet(0x33, &(0x7f0000000040)={@remote, @remote, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x1, 0x0, @empty, '?', @empty, "42a6a7a624255848e94c270bec1afe96"}}}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 07:58:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x4, 0x0) semget(0x1, 0x1, 0x0) semget(0x1, 0x0, 0x120) semget(0x0, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) 07:58:17 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a096151", 0x20) 07:58:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000d0010100}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de0427"], 0x1f}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:58:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x7ffff000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a096151", 0x20) 07:58:18 executing program 1: 07:58:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000effdffff}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:18 executing program 4: 07:58:18 executing program 4: 07:58:18 executing program 1: 07:58:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559362950b86bc01abc8464d4f8a096151", 0x20) 07:58:18 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:18 executing program 3: 07:58:18 executing program 1: 07:58:18 executing program 4: 07:58:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xd0010100}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:19 executing program 1: 07:58:19 executing program 3: 07:58:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000f5ffffff}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:19 executing program 4: 07:58:19 executing program 5: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:19 executing program 3: 07:58:19 executing program 4: 07:58:19 executing program 1: 07:58:19 executing program 3: 07:58:19 executing program 4: 07:58:19 executing program 1: 07:58:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xeffdffff}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:20 executing program 4: 07:58:20 executing program 3: 07:58:20 executing program 1: 07:58:20 executing program 5: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000ff030000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:20 executing program 1: 07:58:20 executing program 3: 07:58:20 executing program 4: 07:58:20 executing program 1: 07:58:20 executing program 3: 07:58:20 executing program 4: 07:58:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf5ffffff}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:21 executing program 3: 07:58:21 executing program 1: 07:58:21 executing program 4: 07:58:21 executing program 5: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000fffffdef}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:21 executing program 3: 07:58:21 executing program 1: 07:58:21 executing program 4: 07:58:21 executing program 3: 07:58:21 executing program 1: 07:58:21 executing program 4: 07:58:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xff030000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:22 executing program 3: 07:58:22 executing program 4: 07:58:22 executing program 1: 07:58:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000ffffff7f}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:22 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:22 executing program 1: 07:58:22 executing program 3: [ 1595.317766][T21289] IPVS: ftp: loaded support on port[0] = 21 07:58:22 executing program 4: 07:58:22 executing program 1: 07:58:22 executing program 4: 07:58:22 executing program 3: 07:58:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xfffffdef}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:23 executing program 1: 07:58:23 executing program 4: 07:58:23 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:23 executing program 3: 07:58:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x80000000fffffff5}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:23 executing program 4: 07:58:23 executing program 3: 07:58:23 executing program 1: [ 1596.318740][T21421] IPVS: ftp: loaded support on port[0] = 21 07:58:23 executing program 1: 07:58:23 executing program 3: 07:58:23 executing program 4: 07:58:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xffffff7f}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:24 executing program 4: 07:58:24 executing program 3: 07:58:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x4}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:24 executing program 1: 07:58:24 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:58:24 executing program 4: 07:58:24 executing program 3: [ 1597.267398][T21552] IPVS: ftp: loaded support on port[0] = 21 07:58:24 executing program 1: 07:58:24 executing program 4: 07:58:24 executing program 3: 07:58:24 executing program 4: 07:58:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xfffffff5}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:25 executing program 1: 07:58:25 executing program 3: [ 1598.952497][T28757] device bridge_slave_1 left promiscuous mode [ 1598.958810][T28757] bridge0: port 2(bridge_slave_1) entered disabled state [ 1599.031999][T28757] device bridge_slave_0 left promiscuous mode [ 1599.038395][T28757] bridge0: port 1(bridge_slave_0) entered disabled state [ 1600.745900][T28757] device hsr_slave_1 left promiscuous mode [ 1600.806723][T28757] device hsr_slave_0 left promiscuous mode [ 1600.847040][T28757] team0 (unregistering): Port device team_slave_1 removed [ 1600.858968][T28757] team0 (unregistering): Port device team_slave_0 removed [ 1600.876056][T28757] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1600.917930][T28757] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1601.018155][T28757] bond0 (unregistering): Released all slaves 07:59:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xc}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:24 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:59:24 executing program 4: 07:59:24 executing program 3: 07:59:24 executing program 1: 07:59:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x7ffffffff000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002e80)={0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000002ec0), 0xfeb4, 0x0, 0x0, 0xfffffdb1) 07:59:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x148}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 1657.847573][T21686] IPVS: ftp: loaded support on port[0] = 21 07:59:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1b9}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:59:25 executing program 1: syz_execute_func(&(0x7f0000000b00)="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") syz_execute_func(&(0x7f00000005c0)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8d02b0fc5e6ce6465f2416fd5d5e3e5c4c259bea000000000fd31ff41d9f307070f71cd30") 07:59:25 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:59:25 executing program 3: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") [ 1658.229063][T21713] IPVS: ftp: loaded support on port[0] = 21 [ 1659.702769][T21823] IPVS: ftp: loaded support on port[0] = 21 [ 1659.804996][T21823] chnl_net:caif_netlink_parms(): no params data found [ 1659.835140][T21823] bridge0: port 1(bridge_slave_0) entered blocking state [ 1659.842344][T21823] bridge0: port 1(bridge_slave_0) entered disabled state [ 1659.849937][T21823] device bridge_slave_0 entered promiscuous mode [ 1659.857583][T21823] bridge0: port 2(bridge_slave_1) entered blocking state [ 1659.864759][T21823] bridge0: port 2(bridge_slave_1) entered disabled state [ 1659.872552][T21823] device bridge_slave_1 entered promiscuous mode [ 1659.891561][T21823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1659.901621][T21823] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1659.918471][T21823] team0: Port device team_slave_0 added [ 1659.925871][T21823] team0: Port device team_slave_1 added [ 1659.973080][T21823] device hsr_slave_0 entered promiscuous mode [ 1660.021216][T21823] device hsr_slave_1 entered promiscuous mode [ 1660.120356][T21823] bridge0: port 2(bridge_slave_1) entered blocking state [ 1660.127484][T21823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1660.134898][T21823] bridge0: port 1(bridge_slave_0) entered blocking state [ 1660.142004][T21823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1660.185116][T21823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1660.199180][T20778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1660.207662][T20778] bridge0: port 1(bridge_slave_0) entered disabled state [ 1660.216247][T20778] bridge0: port 2(bridge_slave_1) entered disabled state [ 1660.225958][T20778] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1660.243338][T21823] 8021q: adding VLAN 0 to HW filter on device team0 [ 1660.253724][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1660.263095][ T3598] bridge0: port 1(bridge_slave_0) entered blocking state [ 1660.270133][ T3598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1660.288365][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1660.297030][ T3598] bridge0: port 2(bridge_slave_1) entered blocking state [ 1660.304224][ T3598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1660.320251][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1660.328868][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1660.343121][T29955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1660.361766][T21823] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1660.372202][T21823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1660.384508][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1660.393183][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1660.401722][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1660.425355][T21823] 8021q: adding VLAN 0 to HW filter on device batadv0 07:59:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xc00}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:28 executing program 1: syz_execute_func(&(0x7f0000000240)="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") pwritev(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f0000000080)='x', 0x1}], 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eecec617d5a73228f097892312d2bbd000010c43c42192d1e9f9ffffff9c4c4c9a90f8d") syz_execute_func(&(0x7f0000000180)="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") 07:59:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5"], 0x39}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:59:28 executing program 3: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0xffffffffffffff85, &(0x7f0000000040)={0x0, 0x40002, 0x0, 0x58f, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:59:28 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:59:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x4000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1661.446706][T21840] IPVS: ftp: loaded support on port[0] = 21 07:59:28 executing program 3: syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 07:59:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000b5000000000000000000005188adfdb4cc55070002d9f137b127c829273502eb42cd8030f39022e15b9479d77bfc098beef32dc3fabf1cc4ad639e0db270328b9270a9"], 0x47}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:59:28 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000040)={0x0, 0x0, 0x80000000, [], 0x0}) 07:59:28 executing program 1: syz_execute_func(&(0x7f0000000b00)="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") setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000080)=0x59ee, 0x4) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:59:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x0) semget(0x1, 0x1, 0x0) semget(0x0, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) semget(0x1, 0x0, 0x0) 07:59:28 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) [ 1661.983915][T21973] IPVS: ftp: loaded support on port[0] = 21 07:59:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x4000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000380), 0xfef6) write$smack_current(r1, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r1, 0x0, 0x0, 0x3ffffff, 0x0, 0xfffffffffffffebe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), 0x14) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 07:59:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x68, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x8, 0x4, [@TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x68}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:59:29 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd4, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, 0x0) 07:59:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x20000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 07:59:29 executing program 1: syz_execute_func(&(0x7f0000000740)="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") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb7308670f7e1f1f94f66766440fd9e1c483457b3101653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 07:59:29 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:59:29 executing program 3: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f18065742b50f1c18c7dec"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{0x0, 0x7fff}, {0x6}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 07:59:29 executing program 1: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x800000000000003, 0x40005, 0x0, 0x0, 0x8, 0x0, 0x2, 0xffffffffffffffff}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:59:29 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x1) recvmsg(r1, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") [ 1662.780589][T22160] IPVS: ftp: loaded support on port[0] = 21 07:59:30 executing program 3: syz_execute_func(&(0x7f0000000c40)="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") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4828daaa3feefffffc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c48dc1c2c2e61010c6bcbc092002c9c421096cfe") 07:59:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xff03}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:30 executing program 1: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f0000000240)="43dd25310000006565d93457460dbdc28a8ac462cdad34d8c441ab5ae3e81b1ee81b411a8666420f50e52d47d9d0c4a1d576a9000000003e8f0236642664459d660f382a6fb7660f38407e0862c422119672ddc4c129d5150a000000fb890f811144d8c79536ef427d192f2f416175f6c40238387d00904ffb1e0000") 07:59:30 executing program 3: syz_execute_func(&(0x7f0000000340)="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") select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffffc422cdad9a0f") 07:59:30 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/5) setitimer(0x0, &(0x7f0000000080)={{}, {0x7}}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="96419cc4a2791dcd0f05bf04411100c4a37bf0c55c41e2e9666bf86402480047eb16000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c4f346dbd24407c4c48154513a7831c4c1fc29c326467703c42295ba29470f898c000000c4219d61860b000000ea33edc4e15f7ce1440ff4697683397fd3fb0000c4633d6c346786662ad78fa820ce3416f9f30f5904797c7c66f2ab440fec3f67dddda8e80fddf6c6c466f2470f2db600000000262ec3c3e2899294d8000000006566400f3a0bdc24c4416c55c60b0bc4414e53d2c5815df71954167a1954167aa815af0000c4a21dbab300000020e27917b5fdf6ffffffffeb628f8f7d9b654300f2f2f04283a900800000002626802d08000000bac402459364bc0000450f91f3c4638d6e8df9ffffff0043ffffff0f4acefb11fc0fdfb83aa2f1fb") 07:59:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf0ff7f00000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:30 executing program 4: syz_execute_func(&(0x7f0000000200)="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") msgsnd(0x0, &(0x7f0000000040)={0x3, "132f0df43094b4ca662bc760e2c145a0f98a19557194f8ef282481223ba31ab90b623c4cfaf354ab0a4203011d79277335fe5b28642ff210f426fdc8a84fb1c9750a4d7fd9f41dc9ab9d96a8cbe832cdfb13e079f7341fda99b211"}, 0x63, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 07:59:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, 0x0, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) connect$tipc(r1, &(0x7f0000000040)=@id={0x1e, 0x3, 0x1, {0x4e21, 0x3}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000280)={0x800}, 0x4) 07:59:30 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) 07:59:30 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window={0x3, 0x0, 0x7}, @timestamp, @timestamp], 0x5) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:59:30 executing program 4: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)={0x0, 0x4, 0x4, 0x0, {}, {}, 0x0, 0x0, @fd, 0xfffffffffffffdf8}) [ 1663.788088][T22464] IPVS: ftp: loaded support on port[0] = 21 07:59:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x68, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x10, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x68}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:59:31 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="f4349b8cc27cd24cc9605a0334a151a79b19085c489fc761e1bb7de8ba5aa491d321cad713b69dc942e6850100f82d14bdf2e688081af4feef745c318ae14c977de869d458d2b44756000000fa743b1c4ba46b"], 0x1) syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") [ 1664.220862][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1664.226726][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1664.232621][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1664.238429][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:59:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x101d0}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 07:59:31 executing program 4: syz_execute_func(&(0x7f0000000b00)="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") setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000080)=0x59ee, 0x4) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:59:31 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window, @timestamp, @timestamp], 0x5) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:59:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf0ffffff7f0000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:31 executing program 4: syz_execute_func(&(0x7f0000000340)="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") select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000, 0x3ff}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffffc422cdad9a0f") 07:59:31 executing program 1: syz_execute_func(&(0x7f0000000b00)="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") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8c4038d0c982b43e51264f30f122d2bbd0000d9f9653e0f212dd5d5e3e50c2a410ff334e931fffff507070f71cd30") 07:59:31 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 07:59:31 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window, @timestamp, @timestamp], 0x5) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:59:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666b5023d6da3"], 0x3d}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 1664.905689][T22706] IPVS: ftp: loaded support on port[0] = 21 07:59:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:32 executing program 1: syz_execute_func(&(0x7f0000000200)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660f380a0e000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a1465322333338fe8189ff2bb4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b8f0001c1cdfe01c1cdfed2c58081601443d9ee0f0f0fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000bac749c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d93457c4e1f9c5cb73470f761f3e0bd06766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5c401c9659f0f000000ece1e1a7fd31ffffffc4810a11de90") [ 1665.340887][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1665.346773][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:59:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x40000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:32 executing program 1: syz_execute_func(&(0x7f00000004c0)="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") setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="f4349b8cc27cd24cc9605a0334a151a79b19085c489fc761e1bb7de8ba5aa491d321cad713b69dc942e6850100f82d14bdf2e688081af4feef745c318ae14c977de869d458d2b44756000000fa743b1c4ba46b"], 0x1) syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 07:59:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x4c}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 1665.500845][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1665.506712][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:59:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x3, 0x6) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000d80)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) 07:59:33 executing program 1: syz_execute_func(&(0x7f0000000b00)="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") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000f9ffffff47696c6530"], 0x1, 0x0}, 0x0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e5affd31fffff507070f71cd30") 07:59:33 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 07:59:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x21e}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 1666.050598][T22961] IPVS: ftp: loaded support on port[0] = 21 07:59:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf0ff7f}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:33 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xff85) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDDELIO(r0, 0x4b35, 0x0) 07:59:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:33 executing program 1: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0xffffffffffffff85, &(0x7f0000000040)={0x0, 0x40002, 0x0, 0x58f, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:59:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xc00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xc0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40880}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 07:59:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0xffffffffffffffff, 0x4, 0x0) semget(0xffffffffffffffff, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) semget(0x1, 0x0, 0x0) 07:59:34 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 07:59:34 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) [ 1667.056308][T23006] IPVS: ftp: loaded support on port[0] = 21 07:59:34 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:34 executing program 3: syz_execute_func(&(0x7f00000004c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab440fec3f67dddda8e80fddf6c6c466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba49c45c450f91f3c4638d6e8df9ffffff00ffff410f4acefb110fc4e251bcdfb83aa2f1fbfbe2") r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/5) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:59:34 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x1000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:34 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x5, 0x4, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r1, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947c066f43deffde579dd", 0xb3) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0x7c9) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, &(0x7f00000004c0)) sendfile(r1, r1, &(0x7f0000000240), 0x8000) 07:59:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x3f00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:35 executing program 3: syz_execute_func(&(0x7f0000000080)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") syz_execute_func(&(0x7f00000001c0)="43dd25310000006565d93457460dbdc28a8ac462cdad34d81ee81b1ee81be52d47d9d0c4a1d576a9000000003e8f0236642664459d660f382a6fb7660f38407e0862c462119672ddc4c129d5150a000000fb890f811144d8c79536ef427d192f2f416175f6c40238387d00370008fb1e0000") 07:59:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x147}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:59:35 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00'}) 07:59:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:35 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window={0x3, 0x0, 0x7}, @timestamp, @timestamp], 0x5) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)) ioctl$int_in(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x0, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:59:35 executing program 1: syz_execute_func(&(0x7f0000000b00)="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") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB="00000080000000004f47a2"], 0x1, 0x0}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:59:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x0, @local}, 0x10) [ 1668.416059][T23078] IPVS: ftp: loaded support on port[0] = 21 07:59:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xc000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) semget(0x1, 0x0, 0x120) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x0) 07:59:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x4000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:36 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window={0x3, 0x0, 0x7}, @timestamp, @timestamp], 0x5) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)) ioctl$int_in(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x0, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 07:59:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:36 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00'}) 07:59:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) semget(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) 07:59:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:36 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x70e) [ 1669.498472][T23128] IPVS: ftp: loaded support on port[0] = 21 07:59:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b2616", 0x21) 07:59:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x40000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x0) semget(0x1, 0x1, 0x0) semget(0x0, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) semget(0x1, 0x0, 0x0) 07:59:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x8000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:37 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000200)={0x0, 0x0, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c39ae8a5"}, 0x0, 0x0, @offset, 0x4}) 07:59:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 07:59:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 07:59:37 executing program 3: syz_execute_func(&(0x7f0000000740)="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") setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, &(0x7f0000000040)={0x0, {{0x1c, 0xffffffffffffffff, 0x0, @ipv4}}}, 0x88) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb7308670f7e1f1f94f66766440fd9e1c483457b3101653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 07:59:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 07:59:37 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00'}) 07:59:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0xbc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0xbc}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 07:59:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) 07:59:37 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp, @timestamp], 0x6) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000000380)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) [ 1670.670279][T23174] IPVS: ftp: loaded support on port[0] = 21 07:59:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) 07:59:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x7ffff000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xd001010000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:38 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000100)="39c9132085fb253a4fb9f5090c97cb", 0xf}], 0x1) syz_execute_func(&(0x7f00000004c0)="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") pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="12a5085f3ab2d01f98fe5b9af5e077c6ca22913fb2c03df0f9948b102623317e05cfcc51c6346f0900c20916133ca8f059a88c173191531a64a3be1b", 0x3c}], 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000140)={@loopback, @broadcast}, 0x10) syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 07:59:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) 07:59:38 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x2000000000) 07:59:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951", 0x11) 07:59:38 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x10001, 0x2000000000000, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 07:59:39 executing program 1: 07:59:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951", 0x11) 07:59:39 executing program 3: 07:59:39 executing program 1: 07:59:39 executing program 5: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/video0\x00', 0x2, 0x0) sync_file_range(r0, 0xffffffffffffffcc, 0x0, 0x0) 07:59:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xd0010100}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xeffdffff00000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x10) semget(0x1, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2, 0xfff}, 0x8) 07:59:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951", 0x11) 07:59:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x104, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 07:59:39 executing program 1: 07:59:39 executing program 1: 07:59:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c734", 0x19) 07:59:39 executing program 1: 07:59:39 executing program 5: 07:59:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c734", 0x19) 07:59:39 executing program 5: 07:59:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xeffdffff}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf5ffffff00000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:40 executing program 1: 07:59:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c734", 0x19) 07:59:40 executing program 5: 07:59:40 executing program 3: 07:59:40 executing program 5: 07:59:40 executing program 1: 07:59:40 executing program 3: 07:59:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d236", 0x1d) 07:59:40 executing program 5: 07:59:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d236", 0x1d) 07:59:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf5ffffff}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xff03000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:41 executing program 3: 07:59:41 executing program 1: 07:59:41 executing program 5: 07:59:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d236", 0x1d) 07:59:41 executing program 1: 07:59:41 executing program 5: 07:59:41 executing program 3: 07:59:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b", 0x1f) 07:59:41 executing program 5: 07:59:41 executing program 1: 07:59:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xff030000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xffffff7f00000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:42 executing program 3: 07:59:42 executing program 5: 07:59:42 executing program 1: 07:59:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b", 0x1f) 07:59:42 executing program 3: 07:59:42 executing program 5: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f18065742b50f1c18c7decc142d507a60eb688c3"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{}, {0x6}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 07:59:42 executing program 1: 07:59:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b", 0x1f) 07:59:42 executing program 5: 07:59:42 executing program 3: 07:59:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xfffffdef}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xffffffff00000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:43 executing program 1: 07:59:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b26", 0x20) 07:59:43 executing program 5: 07:59:43 executing program 3: 07:59:43 executing program 3: 07:59:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b26", 0x20) 07:59:43 executing program 5: 07:59:43 executing program 1: 07:59:43 executing program 1: 07:59:43 executing program 5: 07:59:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xffffff7f}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x49249249249266e, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:44 executing program 3: 07:59:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f228033dfcfffffdffffffff8a906951d7be90764ad9c7342390d2365a1b26", 0x20) 07:59:44 executing program 1: 07:59:44 executing program 5: 07:59:44 executing program 5: 07:59:44 executing program 1: 07:59:44 executing program 3: 07:59:44 executing program 4: 07:59:44 executing program 5: 07:59:44 executing program 1: 07:59:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xfffffff5}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:45 executing program 3: 07:59:45 executing program 4: 07:59:45 executing program 5: 07:59:45 executing program 1: 07:59:45 executing program 3: 07:59:45 executing program 4: 07:59:45 executing program 5: 07:59:45 executing program 1: 07:59:45 executing program 4: 07:59:45 executing program 3: 07:59:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x7ffffffff000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0xc) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:46 executing program 1: 07:59:46 executing program 5: 07:59:46 executing program 3: 07:59:46 executing program 4: 07:59:46 executing program 4: 07:59:46 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{0x0, 0xfffffffffffffeeb}], 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) kexec_load(0x1, 0x0, &(0x7f0000000580), 0x3e0000) 07:59:46 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") setitimer(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") syz_execute_func(&(0x7f00000004c0)="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") 07:59:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774"], 0x20}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:59:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x149}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 07:59:46 executing program 4: r0 = epoll_create(0x800) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{}, "f7c1fa1bc0fb5706", "0f8c5572ed502205e43c6c7688d8695a", "5fd1f719", "164b0e4660c13bf9"}, 0x28) [ 1680.561810][ T7] device bridge_slave_1 left promiscuous mode [ 1680.568077][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1680.602121][ T7] device bridge_slave_0 left promiscuous mode [ 1680.608380][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1682.364233][ T7] device hsr_slave_1 left promiscuous mode [ 1682.408268][ T7] device hsr_slave_0 left promiscuous mode [ 1682.467837][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1682.479488][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1682.491195][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1682.538549][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1682.637858][ T7] bond0 (unregistering): Released all slaves 08:00:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x4000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0xc00) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:46 executing program 1: syz_execute_func(&(0x7f0000000b00)="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") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00/'], 0x1, 0x0}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:00:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x8) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x10) semget(0x1, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xfff}, 0x8) 08:00:46 executing program 5: syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$TIOCSBRK(r2, 0x40044591) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$VT_RELDISP(r3, 0x5605) ptrace(0x11, r0) 08:00:46 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000005c0)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 08:00:46 executing program 1: syz_execute_func(&(0x7f0000000240)="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") setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, &(0x7f00000000c0)={0x0, {{0x1c, 0xffffffffffffffff, 0x0, @loopback}}}, 0x88) pwritev(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f0000000080)='x', 0x1}], 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eecec617d5a73228f097892312d2bbd000010c43c42192d1e9f9ffffff9c4c4c9a90f8d") syz_execute_func(&(0x7f0000000180)="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") 08:00:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x64}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 08:00:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0x1, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), 0x0) semget(0x1, 0x3, 0x0) 08:00:47 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="f4349b8cc27cd24cc9605a0334a151a79b19085c489fc761e1bb7de8ba5aa491d321cad713b69dc942e6850100f82d14bdf2e688081af4"], 0x1) syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 08:00:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semget(0x1, 0x0, 0x0) 08:00:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) [ 1741.086280][T24070] IPVS: ftp: loaded support on port[0] = 21 [ 1741.152380][T24070] chnl_net:caif_netlink_parms(): no params data found [ 1741.181047][T24070] bridge0: port 1(bridge_slave_0) entered blocking state [ 1741.188360][T24070] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.196276][T24070] device bridge_slave_0 entered promiscuous mode [ 1741.204479][T24070] bridge0: port 2(bridge_slave_1) entered blocking state [ 1741.211773][T24070] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.219486][T24070] device bridge_slave_1 entered promiscuous mode [ 1741.238380][T24070] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1741.250090][T24070] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1741.268338][T24070] team0: Port device team_slave_0 added [ 1741.275975][T24070] team0: Port device team_slave_1 added [ 1741.323585][T24070] device hsr_slave_0 entered promiscuous mode [ 1741.391192][T24070] device hsr_slave_1 entered promiscuous mode [ 1741.439026][T24070] bridge0: port 2(bridge_slave_1) entered blocking state [ 1741.446379][T24070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1741.453780][T24070] bridge0: port 1(bridge_slave_0) entered blocking state [ 1741.461040][T24070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1741.498163][T24070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1741.509924][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1741.518202][T17818] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.526584][T17818] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.534923][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1741.548080][T24070] 8021q: adding VLAN 0 to HW filter on device team0 [ 1741.559918][T20784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1741.569340][T20784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1741.576469][T20784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1741.602163][T20782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1741.610636][T20782] bridge0: port 2(bridge_slave_1) entered blocking state [ 1741.617859][T20782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1741.626748][T20782] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1741.636003][T20782] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1741.644515][T20782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1741.655222][T20782] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1741.667179][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1741.678973][T24070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1741.702251][T24070] 8021q: adding VLAN 0 to HW filter on device batadv0 08:00:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0xe00, 0xe, 0x0, &(0x7f0000000140)="263abd030e98ff4dc870d66688a8", 0x0, 0x6000}, 0x28) 08:00:49 executing program 4: syz_execute_func(&(0x7f0000000200)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660f380a0e000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c000000450f0d4016c4c2550a14653223333333ed8fe8189ff2bb4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b8f0001c1cdfe01c1cdfed2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000bac749c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") msgsnd(0x0, &(0x7f0000000040)={0x0, "132f0df43094b4ca662bc760e2c145a0f98a19557194f8ef282481223ba31ab90b623c4cfaf354ab0a4203011d79277335fe5b28642ff210f426fdc8a84fb1c9750a4d7fd9f41dc9ab9d96a8cbe832cdfb13e079f7341fda99b211"}, 0x63, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 08:00:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997d5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e"], 0x54}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:00:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf0ff7f00000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:49 executing program 5: syz_execute_func(&(0x7f0000000600)="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") syz_execute_func(&(0x7f0000000140)="c481fc5b2e6565d93457c421a5f9a7d4d4923266470f1a06661699268f265ac44165fa912b00000091ae00cc43f9493b0ec4c249bfe3fa1bce47dce8") syz_execute_func(&(0x7f00000000c0)="43dd25310000006565d93457c4e1f9c5cb7308670f7e1f1f94f66766440fd9e1c483457b310165da0f212dd5d5fdecc421c15c7ff9a7fd3187ffffa2919224fb90") 08:00:49 executing program 3: syz_execute_func(&(0x7f0000000200)="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") msgsnd(0x0, &(0x7f0000000040)={0x0, "132f0df43094b4ca662bc760e2c145a0f98a19557194f8ef282481223ba31ab90b623c4cfaf354ab0a4203011d79277335fe5b28642ff210f426fdc8a84fb1c9750a4d7fd9f41dc9ab9d96a8cbe832cdfb13e0"}, 0x5b, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 08:00:49 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x800000000000003, 0x40005, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:00:49 executing program 1: syz_execute_func(&(0x7f00000000c0)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660f380a0e000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed8fe8189ff2bb4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b8f0001c1cdfe01c1cdfed2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000bac749c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f1"], 0x1, 0x0) utimes(&(0x7f0000000080)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 08:00:49 executing program 4: syz_execute_func(&(0x7f0000000b00)="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") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB="34ff"], 0x1, 0x0}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:00:49 executing program 5: syz_execute_func(&(0x7f0000000200)="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") syz_execute_func(&(0x7f00000000c0)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a9000000003131f30f122d2bbd0000c4c1c2c2e610f3af457420fed4c421096cfe") 08:00:50 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000040)={0x0, 0x40005, 0x0, 0x0, 0x8, 0x0, 0x2, 0xffffffffffffffff}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:00:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0x3f00) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf0ffffff7f0000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:50 executing program 5: syz_execute_func(&(0x7f0000000b00)="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") syz_execute_func(&(0x7f00000005c0)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f98fe850cd8980a50b2051e3e50ca7fd31fffff50707aea7a771cd30") 08:00:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1a1}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:00:50 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x8001, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) io_getevents(r1, 0x1, 0x1, &(0x7f0000000140)=[{}], 0x0) io_submit(r1, 0x1, &(0x7f0000001840)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 08:00:50 executing program 4: syz_execute_func(&(0x7f0000000380)="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") setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, &(0x7f0000000040)={0x0, {{0x1c, 0x0, 0x0, @ipv4, 0x1}}}, 0x51) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb7308670f7e1f1f94f66766440fd9e1c483457b3101653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") 08:00:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xbc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:00:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x4, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x120) semget(0x0, 0x0, 0x0) 08:00:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="bfa40000bf01000000000000000069ce4600ab723ce4d5ff00000000f7013836cd04f76950db4a2287b3b3318b9d1f2d913d6da34511973cedebd06a537759b1008643cf7756cf22cc18a6d0716636590ecd39b09f96b532737db924a199545d2ceaf7d8927162fb1c1fc885efc3ee4d7dba0ad9d881bb9062995408124949c5f4d969d557729c3b72eccba683e45b21a997fbf21efcfa1f66098fe22e22d92e9b6328449c5997959a93aa99d50119f894e64951d6b664598324b9e7bafc0302e1ef256cf4e3f54fe02d25b2c27eb38ade4432ae9aaa10e63e718c596c4282acc55b9f01d3d6b1f522febe70584d5b703d9c028e5852060d3efb2c5216a6a1ccdb56d404d82e9863c163ff1bf0bc1984147e64548bf79e0cec939aff9d75c4f15b4a"], 0x122}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:00:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x81, 0x8f, 0x9, 0x0, 0x0, 0x2, 0x1000, 0x4, 0x6, 0x0, 0x8, 0x7, 0x3f, 0x5, 0x80000001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfa, 0xffffffffffffff11, 0x3ff, 0x0, 0x100, 0x9, 0x6, 0x100000001, 0x0, 0xeb, 0x6, 0x7, 0x7, 0x590, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x3, 0x0, 0x1, 0x2628, 0x4718, 0x1}, 0x0, 0x7, r2, 0x3) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) 08:00:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x146}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:00:51 executing program 1: syz_execute_func(&(0x7f00000004c0)="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") setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="f4349b8cc27cd24cc9605a0334a151a79b19085c489fc761e1bb7de8ba5aa491d321cad713b69dc942e6850100f82d14bdf2e688081af4feef745c318ae14c977de869d458d2b44756000000fa"], 0x1) syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 08:00:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0x4000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x100000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f12090000009bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="ac8ac6f99a83f3762554f99d4329f65901d9a43b86ba2f9b67db620e993377f583b3911f2b09fb4a565adb15f71806d2c4562b3e3a1ffdb621ca7b58cc7a5090fe4e004a2964ea3e1da248221388f9cfd3c0763a02"], 0x55}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:00:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x10) semget(0xffffffffffffffff, 0x1, 0x1) semget(0x0, 0x2, 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xfff}, 0x8) 08:00:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) semget(0xffffffffffffffff, 0x1, 0x0) semget(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0x8) semget(0x1, 0x3, 0x120) 08:00:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x120) semget(0x1, 0x4, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, 0x0, 0x0) 08:00:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:00:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b666"], 0x38}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:00:52 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40005, 0x0, 0x0, 0x8, 0x0, 0x2, 0xffffffffffffffff}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:00:52 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x800000000000003, 0x40005, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:00:52 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @window, @timestamp, @timestamp], 0x5) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x1, [], r1, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 08:00:52 executing program 3: syz_execute_func(&(0x7f0000000b00)="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") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)=ANY=[@ANYBLOB="00ff"], 0x1, 0x0}, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:00:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0xff03) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xc00000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:52 executing program 3: syz_execute_func(&(0x7f0000000380)="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") setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, &(0x7f0000000040)={0x0, {{0x1c, 0xffffffffffffffff, 0x0, @ipv4, 0x1}}}, 0x51) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb7308670f7e1f1f94f66766440fd9e1c483457b3101653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") 08:00:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x5c}}, 0x0) syz_execute_func(&(0x7f0000000280)="91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 08:00:52 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x3d8, 0x0, 0xe9, &(0x7f0000000440)=""/94, 0x3b}, 0x0) syz_execute_func(&(0x7f0000000200)="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") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 08:00:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:00:52 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x22c}, 0x0) syz_execute_func(&(0x7f0000000c40)="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") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 08:00:52 executing program 1: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x800000000000003, 0x40005, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:00:52 executing program 5: syz_execute_func(&(0x7f0000000b00)="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") open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c4012d564a00085dfcf30f122d2bbd0000653e0f212dd5d5e3e5ba73647364fff507070f71cd30") 08:00:52 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x22c}, 0x0) syz_execute_func(&(0x7f0000000c40)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0bc4a3c1483194c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6443ff9e0080000036f04283a900800000202626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)='4', 0x1}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2fd38fc4e1a915a900000000fcf30f122d2bbd0000c4c1c2c2e610f3af8f092002c9c421096cfe") 08:00:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x138, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xf4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:00:53 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x800000000000003, 0x40005, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:00:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0x101d0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x4000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:53 executing program 4: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="f4349b8cc27cd24cc9605a0334a151a79b19085c489fc761e1bb7de8ba5aa491d321cad713b69dc942e6850100f82d14bdf2e688081af4feef745c318ae14c977d"], 0x1) syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 08:00:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1b8}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:00:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_execute_func(&(0x7f0000000080)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f43cd08") r2 = dup2(r0, r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x364) connect$inet6(r1, &(0x7f0000000140), 0x1c) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f00000003c0)="92", 0x1) sendfile(r1, r3, &(0x7f0000000200), 0x7) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$addseals(r3, 0x409, 0x8) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, 0x0) 08:00:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xf4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:00:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0x40000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) 08:00:53 executing program 4: syz_execute_func(&(0x7f00000004c0)="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") setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="f4349b8cc27cd24cc9605a0334a151a79b19085c489fc761e1bb7de8ba5aa491d321cad713b69dc942e6850100f82d14bdf2e688081af4feef745c318ae14c977de869d458d2b44756000000fa"], 0x1) syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 08:00:53 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="410f01f964ff0941c3c4e2c9975842c4c20d056e0f66420fe2e33e0f1110c442019dcc6f") execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x8000100000001, 0x58a9430c) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0xb5) open$dir(&(0x7f0000000540)='./file0\x00', 0x83d, 0x0) 08:00:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x138, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xf4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:00:54 executing program 4: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="b8"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{0x0, 0x7fff}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 08:00:54 executing program 3: syz_execute_func(&(0x7f00000000c0)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="d16c"], 0x1, 0x0) utimes(0x0, &(0x7f0000000080)={{0x0, 0x7fff}}) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 08:00:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0x8000000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) semget(0xffffffffffffffff, 0x0, 0x120) semget(0xffffffffffffffff, 0x4, 0x0) 08:00:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xc0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:00:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x10) semget(0xffffffffffffffff, 0x1, 0x1) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xfff}, 0x8) 08:00:54 executing program 5: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="f4349b8cc27cd24cc9605a0334a151a79b19085c489fc761e1bb7de8ba5aa491d321cad713b69dc942e6850100f82d14bdf2e688081af4feef745c318ae14c977de869d458d2b44756000000fa"], 0x1) syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") [ 1761.661552][ T7] device bridge_slave_1 left promiscuous mode [ 1761.667796][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1761.731690][ T7] device bridge_slave_0 left promiscuous mode [ 1761.738163][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1763.133026][ T7] device hsr_slave_1 left promiscuous mode [ 1763.186841][ T7] device hsr_slave_0 left promiscuous mode [ 1763.246322][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1763.258044][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1763.270656][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1763.308056][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1763.398082][ T7] bond0 (unregistering): Released all slaves 08:01:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0x200000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:01:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d"], 0x2d}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:01:54 executing program 3: syz_execute_func(&(0x7f0000000b00)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50c2a410ff334e931fffff507070f71cd30") mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 08:01:54 executing program 4: syz_execute_func(&(0x7f0000000200)="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") msgsnd(0x0, &(0x7f0000000040)={0x0, "132f0df43094b4ca662bc760e2c145a0f98a19557194f8ef282481223ba31ab90b623c4cfaf354ab0a4203011d79277335fe5b2864"}, 0x3d, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 08:01:54 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x800000000000003, 0x40005, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:01:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xd001010000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:01:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x2, 0x0) 08:01:54 executing program 5: syz_execute_func(&(0x7f0000000340)="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") select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffbd2}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffffc422cdad9a0f") 08:01:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="000000000000000000000d000000b80004002c000700080002000000000008000200150000000800020000000000080001000000000008000300000000000c00010073797a300000000014000700080004000000000008000100000000002c000700080002000000000008000300000000000800040000000000080001000000000008000200000000002400070008000200000000000800040000000000080002000000000008000100000000001400010004000700400004001400010062726f6164636173742d6c696e6b0000140007000800030000000000080003000000000014000700080004000000000008000200000000001c0007000c00030000000000000000000c000400"/290], 0x1}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 08:01:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x81, 0x8f, 0x9, 0x0, 0x0, 0x2, 0x1000, 0x4, 0x6, 0x0, 0x8, 0x7, 0x3f, 0x5, 0x80000001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfa, 0xffffffffffffff11, 0x3ff, 0x0, 0x100, 0x9, 0x6, 0x100000001, 0x0, 0xeb, 0x0, 0x7, 0x7, 0x590, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x3, 0x0, 0x1, 0x2628, 0x4718, 0x1}, 0x0, 0x7, r2, 0x3) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) 08:01:54 executing program 1: syz_execute_func(&(0x7f0000000340)="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") select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffffc422cdad9a0f") 08:01:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 1808.422783][T25906] IPVS: ftp: loaded support on port[0] = 21 [ 1808.490667][T25906] chnl_net:caif_netlink_parms(): no params data found [ 1808.520305][T25906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1808.527738][T25906] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.535433][T25906] device bridge_slave_0 entered promiscuous mode [ 1808.545926][T25906] bridge0: port 2(bridge_slave_1) entered blocking state [ 1808.553199][T25906] bridge0: port 2(bridge_slave_1) entered disabled state [ 1808.561117][T25906] device bridge_slave_1 entered promiscuous mode [ 1808.577903][T25906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1808.588097][T25906] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1808.607535][T25906] team0: Port device team_slave_0 added [ 1808.615130][T25906] team0: Port device team_slave_1 added [ 1808.684016][T25906] device hsr_slave_0 entered promiscuous mode [ 1808.741236][T25906] device hsr_slave_1 entered promiscuous mode [ 1808.801437][T25906] bridge0: port 2(bridge_slave_1) entered blocking state [ 1808.808527][T25906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1808.816047][T25906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1808.823123][T25906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1808.860306][T25906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1808.872914][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1808.882406][T17818] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.889876][T17818] bridge0: port 2(bridge_slave_1) entered disabled state [ 1808.898554][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1808.910222][T25906] 8021q: adding VLAN 0 to HW filter on device team0 [ 1808.922306][T20784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1808.930704][T20784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1808.937848][T20784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1808.948392][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1808.957362][T17818] bridge0: port 2(bridge_slave_1) entered blocking state [ 1808.964467][T17818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1808.982743][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1808.999566][T25906] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1809.010240][T25906] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1809.026172][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1809.034232][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1809.043262][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1809.051731][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1809.060000][T17818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1809.078671][T25906] 8021q: adding VLAN 0 to HW filter on device batadv0 08:01:57 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x800000000000003, 0x40005}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:01:57 executing program 5: clone(0x100000, 0x0, &(0x7f0000000100), 0xffffffffffffffff, &(0x7f0000000140)) 08:01:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x81, 0x8f, 0x9, 0x0, 0x0, 0x2, 0x1000, 0x4, 0x6, 0x0, 0x8, 0x7, 0x0, 0x5, 0x80000001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfa, 0xffffffffffffff11, 0x3ff, 0x0, 0x100, 0x9, 0x6, 0x100000001, 0x0, 0xeb, 0x6, 0x7, 0x7, 0x590, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x3, 0x0, 0x1, 0x2628, 0x4718, 0x1}, 0x0, 0x7, r2, 0x3) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) 08:01:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xeffdffff00000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:01:57 executing program 3: syz_execute_func(&(0x7f0000000340)="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") select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffffc422cdad9a0f") 08:01:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0xf0ff7f) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:01:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0xe4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667d2c65}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:01:57 executing program 1: 08:01:57 executing program 4: syz_execute_func(&(0x7f0000000240)="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") pipe2(&(0x7f0000000080), 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eecec617d5a73228f097892312d2bbd000010c43c42192d1e9f9ffffff9c4c4c9a90f8d") syz_execute_func(&(0x7f0000000180)="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") 08:01:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xa8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:01:57 executing program 1: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="f4349b8cc27cd24cc9605a0334a151"], 0x1) syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000000c0)="43dd25210000006565d93457c4e3f12145b23303e31c55e649935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 08:01:57 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x40005, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:01:57 executing program 1: syz_execute_func(&(0x7f0000000200)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660f380a0e000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c000000450f0d4016c4c2550a14653223333333ed8fe8189ff2bb4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b8f0001c1cdfe01c1cdfed2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000bac749c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") msgsnd(0x0, &(0x7f0000000040)={0x0, "132f0df43094b4ca662bc760e2c145a0f98a19557194f8ef282481223ba31ab90b623c4cfaf354ab0a4203011d79277335fe5b28642ff210f426fdc8a8"}, 0x45, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffffffc4a2919224fb90") 08:01:57 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000700)=""/235, 0xeb, 0x0) 08:01:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0x1000000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:01:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)={0xc0, r2, 0x821, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x78}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40}, 0x0) [ 1810.672082][T26176] Started in network mode [ 1810.703728][T26176] Own node identity 7f000001, cluster identity 4711 [ 1810.725395][T26176] New replicast peer: 255.255.255.255 [ 1810.734335][T26176] Enabled bearer , priority 10 [ 1810.749174][T26180] Enabling of bearer rejected, already enabled 08:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f12090000009bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="ac8ac6f99a83f3762554f99d4329f65901d9a43b86ba2f9b67db620e993377f583b3911f2b09fb4a565adb15f71806d2c4562b3e3a1ffdb621ca7b58cc7a5090fe4e"], 0x42}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:01:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0xffffffffffffffff, 0x0, 0x120) semget(0x1, 0x4, 0x0) semget(0x1, 0x1, 0x0) semget(0x1, 0x0, 0x120) semget(0x0, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, 0x0) 08:01:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() write$cgroup_subtree(r0, 0x0, 0x0) write$cgroup_pid(r2, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 08:01:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xf5ffffff00000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:01:58 executing program 3: syz_execute_func(&(0x7f00000001c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c10004096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6d1f2ae00acf1ebeb628f8f7d9b6500f2366766410f3a151702262680722d000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") select(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x800000000000003, 0x40005, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:01:58 executing program 3: syz_execute_func(&(0x7f0000000b00)="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") syz_execute_func(&(0x7f0000000700)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d540e5f6f62666430f388b3fa8d33b0a67670ff3349631ff6442db3e0707f246dad2") 08:01:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x120}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:01:58 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") select(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x800000000000003, 0x40005, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfc430c03d9d6653e0f212dd5d5e3e50ca7fd31fffff507070f71cd30") 08:01:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 08:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021230948de"], 0x1d}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:01:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x98, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:01:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0xc000000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:01:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) sendto$inet(r0, &(0x7f0000000500)="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", 0x5c1, 0x0, 0x0, 0x0) 08:01:58 executing program 1: syz_execute_func(&(0x7f00000000c0)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660f380a0e000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed8fe8189ff2bb4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b8f0001c1cdfe01c1cdfed2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000bac749c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") utimes(0x0, &(0x7f0000000200)={{0x5, 0x6}, {0x0, 0x5}}) connect$unix(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="82026588fb000000000008"], 0x1) syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8de84dfc43dfc68f097893312d2bbd000010c440d11ea7fdffadffff81fc11e38d") 08:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x170}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 1811.852244][T23367] 32-bit node address hash set to 100007f 08:01:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xa8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:01:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xff03000000000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:01:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000380), 0xfef6) write$smack_current(r1, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r1, 0x0, 0x0, 0x3ffffff, 0x0, 0xfffffffffffffebe) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) 08:01:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}, @TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x10, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x5c}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 08:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e00002123292f48de042774602f36cddb4aa287b3b3312d91f79ecb26167f6444b6"], 0x37}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:01:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0x1, 0x0, 0x10) semget(0xffffffffffffffff, 0x1, 0x1) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140), 0x8) 08:01:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) 08:01:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xb8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40880}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:01:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000}], 0x4924924924926c8, 0x3f000000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:01:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xa8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="644135a09d00009145e004cf1414ab5a4be2f9c481381608a0edaa287fc1000000851998cfa800c5e718c6c63ec4a169e41978e2dae9c4a259acdcab1673112640bd4f0c6641f2ae430f01d7d5c421ff70a5664b6a50f1c4eee5f758c442f8f3499ec4427d23bf0000000026f20f5d30366766450f8f00100002c4012171e0ffa93944df83c4a15d65594d62e16064e9dd20dd208fe840effb43362c22140084c4c4c2b947f18461da652e65f2436f52c4422db6bc149c1d00004c0daf33f90000") r1 = open(&(0x7f0000000200)='./file0\x00', 0x210c2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xe}, 0x20e) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semget(0xffffffffffffffff, 0x4, 0x0) semget(0x1, 0x0, 0x0) semget(0x1, 0x0, 0x0) semget(0xffffffffffffffff, 0x2, 0x0) 08:01:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 08:01:59 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) clone(0xf102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) readv(r3, &(0x7f0000000640)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup3(r4, r3, 0x0) tkill(r2, 0x1000000000015) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, 0x0) [ 1812.771553][T26699] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:02:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78), 0x8000000000000000, 0xffffff7f00000000}], 0x4924924924926c8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:02:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 08:02:00 executing program 4: syz_execute_func(&(0x7f0000000340)="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") select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8c4811572f4f3fc0faaad2bbd000010c4c4e37d05287afdffffc422cdad9a0f") 08:02:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f79ecb2616"], 0x27}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188f5d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd4997fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:02:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xb4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40880}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") 08:02:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x165}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 1813.421230][T23367] list_del corruption, ffffea000257aa08->next is LIST_POISON1 (dead000000000100) [ 1813.431374][T23367] ------------[ cut here ]------------ [ 1813.436939][T23367] kernel BUG at lib/list_debug.c:45! [ 1813.442257][T23367] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1813.448335][T23367] CPU: 0 PID: 23367 Comm: kworker/0:7 Not tainted 5.2.0-rc1+ #6 [ 1813.455973][T23367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1813.466054][T23367] Workqueue: events cache_reap 08:02:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x40880}, 0x10) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66988d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c73f30faed6386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba8000000543f") [ 1813.470838][T23367] RIP: 0010:__list_del_entry_valid.cold+0x23/0x4f [ 1813.477267][T23367] Code: e8 65 50 25 fe 0f 0b 4c 89 f6 48 c7 c7 e0 b7 a4 87 e8 54 50 25 fe 0f 0b 4c 89 ea 4c 89 f6 48 c7 c7 20 b7 a4 87 e8 40 50 25 fe <0f> 0b 4c 89 e2 4c 89 f6 48 c7 c7 80 b7 a4 87 e8 2c 50 25 fe 0f 0b [ 1813.496884][T23367] RSP: 0000:ffff888091c57bd8 EFLAGS: 00010086 [ 1813.502967][T23367] RAX: 000000000000004e RBX: ffffe8ffffc6f6a0 RCX: 0000000000000000 [ 1813.510948][T23367] RDX: 0000000000000000 RSI: ffffffff815ac7e6 RDI: ffffed101238af6d [ 1813.515875][ T3877] kobject: 'loop4' (000000009964cfd0): kobject_uevent_env [ 1813.518938][T23367] RBP: ffff888091c57bf0 R08: 000000000000004e R09: ffffed1015d06011 [ 1813.534004][T23367] R10: ffffed1015d06010 R11: ffff8880ae830087 R12: dead000000000200 [ 1813.536091][ T3877] kobject: 'loop4' (000000009964cfd0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1813.541992][T23367] R13: dead000000000100 R14: ffffea000257aa08 R15: ffffea000257aa08 [ 1813.542004][T23367] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1813.542011][T23367] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1813.542019][T23367] CR2: 00000000f5d8bd40 CR3: 0000000098d12000 CR4: 00000000001406f0 [ 1813.542027][T23367] Call Trace: [ 1813.542053][T23367] free_block+0xd8/0x250 [ 1813.591146][T23367] drain_array_locked+0x36/0x90 [ 1813.596010][T23367] drain_array+0x8c/0xb0 [ 1813.600264][T23367] cache_reap+0xf4/0x280 [ 1813.604514][T23367] process_one_work+0x989/0x1790 [ 1813.609462][T23367] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1813.614840][T23367] ? lock_acquire+0x16f/0x3f0 [ 1813.619536][T23367] worker_thread+0x98/0xe40 [ 1813.624047][T23367] ? trace_hardirqs_on+0x67/0x220 [ 1813.629082][T23367] kthread+0x354/0x420 [ 1813.633154][T23367] ? process_one_work+0x1790/0x1790 [ 1813.638361][T23367] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1813.644621][T23367] ret_from_fork+0x24/0x30 [ 1813.649046][T23367] Modules linked in: [ 1813.655475][T23367] ---[ end trace eb0323d37173a394 ]--- [ 1813.660959][T23367] RIP: 0010:__list_del_entry_valid.cold+0x23/0x4f [ 1813.667379][T23367] Code: e8 65 50 25 fe 0f 0b 4c 89 f6 48 c7 c7 e0 b7 a4 87 e8 54 50 25 fe 0f 0b 4c 89 ea 4c 89 f6 48 c7 c7 20 b7 a4 87 e8 40 50 25 fe <0f> 0b 4c 89 e2 4c 89 f6 48 c7 c7 80 b7 a4 87 e8 2c 50 25 fe 0f 0b [ 1813.687076][T23367] RSP: 0000:ffff888091c57bd8 EFLAGS: 00010086 [ 1813.688084][ T3877] kobject: 'loop5' (000000004808bf94): kobject_uevent_env [ 1813.693138][T23367] RAX: 000000000000004e RBX: ffffe8ffffc6f6a0 RCX: 0000000000000000 [ 1813.693145][T23367] RDX: 0000000000000000 RSI: ffffffff815ac7e6 RDI: ffffed101238af6d [ 1813.693153][T23367] RBP: ffff888091c57bf0 R08: 000000000000004e R09: ffffed1015d06011 [ 1813.693160][T23367] R10: ffffed1015d06010 R11: ffff8880ae830087 R12: dead000000000200 [ 1813.693176][T23367] R13: dead000000000100 R14: ffffea000257aa08 R15: ffffea000257aa08 [ 1813.716616][ T3877] kobject: 'loop5' (000000004808bf94): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1813.724260][T23367] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1813.724269][T23367] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1813.724275][T23367] CR2: 00000000f5d8bd40 CR3: 0000000098d12000 CR4: 00000000001406f0 [ 1813.724286][T23367] Kernel panic - not syncing: Fatal exception [ 1813.733299][T23367] Kernel Offset: disabled [ 1813.787013][T23367] Rebooting in 86400 seconds..