0000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x4) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) signalfd4(r0, &(0x7f0000000440)={0x2}, 0x8, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0xff}) ioctl(r1, 0xffffffffffffffb8, &(0x7f0000000440)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) r3 = getpgrp(0xffffffffffffffff) r4 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x1, 0x8000) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f00000003c0)={r4, r1, 0x80000001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f0000000400)=0x8) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRESDEC=0x0, @ANYPTR64, @ANYRES32], 0x20) r5 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r5) 23:53:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x100, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000440)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x8000, 0x0) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000004c0), &(0x7f0000000480)=0xffffffffffffff56) 23:53:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x7f) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x401, 0x5}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)={r1, 0x1, 0x7, [0x1, 0xfffffffffffffe01, 0x7, 0x4, 0x80, 0x8, 0x7]}, &(0x7f0000000340)=0x16) 23:53:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x401, 0x5}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)={r1, 0x1, 0x7, [0x1, 0xfffffffffffffe01, 0x7, 0x4, 0x80, 0x8, 0x7]}, &(0x7f0000000340)=0x16) 23:53:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:52 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x1, 0x80000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000002c0)={0x8, 0x3, 0x0, 0x0, 0x0, [], [], [], 0x4, 0x7fff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(r2, 0x0, 0xfd4e) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) 23:53:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) 23:53:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000280), &(0x7f0000000380)=0x4) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000580)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000000500)="03024b6d0d2527934d7a0e0a83cc0d7e36493ad4d5c34bd2e2d94aa61ee3d9436a0eef40339452916e3bce2766e47686dbe72ee08a5a624dd09669f50c5d21005210b1cfc6554f5efd6cc70a729377dc", 0x50, r0}, 0x68) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="b8", 0x1}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x8) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES64=r3], @ANYRES16=0x0], 0x11) r5 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'vcan0\x00', {0x2, 0x4e23, @loopback}}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000440)) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r5) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-monitor\x00', 0x41, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r6, 0xc0185647, &(0x7f0000000400)={0xa10000, 0x5, 0x20, [], &(0x7f00000003c0)={0xbb09cf, 0x9, [], @value=0x6}}) 23:53:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x7, 0x26001) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x81, 0x0, 0x0, 0x11f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$P9_RLOPEN(r1, &(0x7f00000002c0)={0x18, 0xd, 0x2, {{0x80, 0x4, 0x2}, 0x4}}, 0x18) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0xfffffffffffffffa, 0x101100) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000400)={0x90, "239730133fed9a416aec929b50909e9a5a3616957153934ffe7d8da4544ea3fb", 0x2, 0x1}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000880)=0x14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000005c0)={0x0, 0x82d6c01be2b654a2, "c375b61b3b164b177322011987a43be78e05f7b1b8d0197316c833c66863797a8335f0f2f0581a6210a2a99991aa1784d7638102987ef68325b5c8b64b60d13a3f79baa15e0f0fc92b0c82534f5f6a219c9aae70b280996d749b13696105cf2cc4905632a2ec8f63d628ec4132f31d1b613755"}, &(0x7f00000006c0)=0x7b) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000540)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, @empty, @loopback, 0x7f, 0x4, 0x2, 0x400, 0x0, 0x200000, r2}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000500)={r3, 0x4f79}, 0x8) connect(r0, &(0x7f00000008c0)=@xdp={0x2c, 0x4, r2, 0x22}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x362) r4 = getpid() perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x2, 0x80000000, 0x5, 0x7f, 0x0, 0x2, 0xa, 0x8, 0x2321, 0x3, 0x0, 0x9, 0x101, 0x100000000, 0x9, 0x46, 0x9, 0x2000000, 0x2, 0x100000000, 0x1, 0x3, 0x47aea425, 0x9, 0x9, 0x7, 0x81, 0x40, 0x0, 0x2, 0x9, 0xbd, 0x1ff, 0x9, 0x57, 0x6, 0x0, 0x1, 0x6, @perf_bp={&(0x7f0000000300), 0x2}, 0x100, 0xdc, 0x6, 0x8, 0x512c, 0xfffffffffffff800, 0x1}, r4, 0xa, r0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000440)="b1ac8a26ef9ba7fbed17332c4d16f6cea8d547617e1f496666deafe5d090593eebe977a768f55348ff2761da56ab76672324b3e90938813f130cb219df0e47421fcbad342fcf807895a9055e4ef0ca661115e0ade9c731a67419fab33ca021001f7f072a25d22f136fb3c7db24f60fabf4122eba4113ae6e8fb87ea0d4d7fa030891c3171d379af378873ac3673b5ef9d8af9f8c8c435a4e95880e9e8886ba6f9b26e8278964e6f6760d6602cc0d54de0389", 0xb2}, {&(0x7f0000000700)="9f8fb03e2f8e9e767139b08bc6c2f660896c3d965d406602727eea3855708366201e5797c315c490f5100651a9d92c253718ccb3c47dd6d91a1897c33d8eaf99f2a752ac515f0991676f6092a691bcfbd6a00d7ad08e506a29a38b0c619b73377406180c6804ac1abd77fe338b316bf8ae328953001f19d2632baacf8a84d2dd7e8bc59b93766058e34fcab6c61f7f792da008ac532adc0710470d93f31476e58fab9f74b8aee10f7675bf2f8dc685b3513ecccbd08cbd28f2bc5c166b977a", 0xbf}, {&(0x7f0000000940)="b7b8aa9a55e01ca8c77b0d85448274d917d2083302d5c4c9ea5b22f4d4bac6d12b9d900c1227e93ef777ce32c54155f9a6af67c24d184228187eabef14340cb83655e12e039c7b7e065f9df6feb7d308f0b60d5c532fcda3db9c1a2a991f4dca9f31b379a19d5706bb9d6a6fc8beab395dbd7a6c276f0d9672ac4ab395d2778d4a99aec9d64699093afe70d3755e3019dc10f086af42667ba88d5eefe2d4b29a70b05cd22d1628865bd10c01b3058d622fd7f4fd52a907350892cef8ee5528cd0f5b80216f6c3eafa076de22fea88e915fe11a931655fe58f4e6f28f36a816e10d0d18f2981714c3f8b91d19", 0xec}], 0x3) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff8) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8200) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff8) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff8) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8200) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff8) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8200) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:57 executing program 3 (fault-call:4 fault-nth:0): openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:53:57 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:53:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:57 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:53:57 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8946, &(0x7f0000000000)) 23:53:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:58 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:53:58 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x402c582a, &(0x7f0000000000)) [ 663.386751] IPVS: length: 28 != 24 23:53:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 663.502655] IPVS: length: 28 != 24 23:53:58 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8907, &(0x7f0000000000)) 23:53:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:53:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x7400, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:53:58 executing program 0 (fault-call:10 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:53:58 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:53:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:53:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x5000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:53:58 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r0 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r0) 23:53:58 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x2, &(0x7f0000000000)) 23:53:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:53:58 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r0 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r0) 23:53:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0xffffff7f00000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:53:58 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x4020940d, &(0x7f0000000000)) 23:53:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) [ 664.193508] IPVS: length: 28 != 24 [ 664.620411] FAULT_INJECTION: forcing a failure. [ 664.620411] name fail_futex, interval 1, probability 0, space 0, times 1 [ 664.632026] CPU: 0 PID: 27130 Comm: syz-executor0 Not tainted 4.20.0-rc4+ #261 [ 664.639411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.649804] Call Trace: [ 664.652394] dump_stack+0x244/0x39d [ 664.656019] ? dump_stack_print_info.cold.1+0x20/0x20 [ 664.661211] ? lock_is_held_type+0x210/0x210 [ 664.665619] should_fail.cold.4+0xa/0x17 [ 664.669717] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 664.674919] ? lock_is_held_type+0x210/0x210 [ 664.679372] ? zap_class+0x640/0x640 [ 664.683085] ? trace_hardirqs_on+0x310/0x310 [ 664.687650] ? kvm_clock_read+0x18/0x30 [ 664.691633] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 664.696649] ? find_held_lock+0x36/0x1c0 [ 664.700749] ? hrtimer_try_to_cancel+0x21c/0x6f0 [ 664.705658] ? lock_downgrade+0x900/0x900 [ 664.709803] ? native_apic_msr_write+0x5a/0x80 [ 664.714386] get_futex_key+0x127d/0x21b0 [ 664.718444] ? trace_hardirqs_on+0x310/0x310 [ 664.722872] ? fixup_owner+0x250/0x250 [ 664.726755] ? hrtimer_try_to_cancel+0xb8/0x6f0 [ 664.731428] ? __lock_acquire+0x62f/0x4c20 [ 664.735658] ? print_usage_bug+0xc0/0xc0 [ 664.739717] ? print_usage_bug+0xc0/0xc0 [ 664.743774] ? mark_held_locks+0x130/0x130 [ 664.748010] ? check_preemption_disabled+0x48/0x280 [ 664.753033] ? __lock_acquire+0x62f/0x4c20 [ 664.757267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.762804] ? print_usage_bug+0xc0/0xc0 [ 664.766877] ? __lock_acquire+0x62f/0x4c20 [ 664.771111] ? debug_smp_processor_id+0x1c/0x20 [ 664.775778] ? mark_held_locks+0x130/0x130 [ 664.780009] ? lock_unpin_lock+0x4a0/0x4a0 [ 664.784243] ? __lock_acquire+0x62f/0x4c20 [ 664.788476] ? zap_class+0x640/0x640 [ 664.792186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.797720] ? check_preemption_disabled+0x48/0x280 [ 664.802741] ? debug_smp_processor_id+0x1c/0x20 [ 664.807403] ? perf_trace_lock+0x14d/0x7a0 [ 664.811636] ? lock_is_held_type+0x210/0x210 [ 664.816050] ? zap_class+0x640/0x640 [ 664.819758] ? check_preemption_disabled+0x48/0x280 [ 664.824775] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 664.829895] ? debug_smp_processor_id+0x1c/0x20 [ 664.834566] ? find_held_lock+0x36/0x1c0 [ 664.838622] ? print_usage_bug+0xc0/0xc0 [ 664.842679] ? print_usage_bug+0xc0/0xc0 [ 664.846733] ? is_bpf_text_address+0xac/0x170 [ 664.851226] ? print_usage_bug+0xc0/0xc0 [ 664.855281] ? lock_downgrade+0x900/0x900 [ 664.859423] ? print_usage_bug+0xc0/0xc0 [ 664.863481] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 664.868407] ? kasan_check_read+0x11/0x20 [ 664.872551] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 664.877826] futex_wake+0x1ac/0x760 [ 664.881470] ? get_futex_key+0x21b0/0x21b0 [ 664.885709] ? __lock_acquire+0x62f/0x4c20 [ 664.889943] do_futex+0x2e4/0x26d0 [ 664.893486] ? mark_held_locks+0x130/0x130 [ 664.897836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.903388] ? exit_robust_list+0x280/0x280 [ 664.907706] ? debug_smp_processor_id+0x1c/0x20 [ 664.912371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.917916] ? check_preemption_disabled+0x48/0x280 [ 664.922930] ? debug_smp_processor_id+0x1c/0x20 [ 664.927604] ? perf_trace_lock+0x14d/0x7a0 [ 664.931846] ? zap_class+0x640/0x640 [ 664.935576] ? lock_is_held_type+0x210/0x210 [ 664.939987] ? find_held_lock+0x36/0x1c0 [ 664.944048] ? zap_class+0x640/0x640 [ 664.947760] ? find_held_lock+0x36/0x1c0 [ 664.951829] ? find_held_lock+0x36/0x1c0 [ 664.956144] ? __might_fault+0x12b/0x1e0 [ 664.960206] ? lock_downgrade+0x900/0x900 [ 664.964356] ? lock_release+0xa00/0xa00 [ 664.968327] ? perf_trace_sched_process_exec+0x860/0x860 [ 664.973840] mm_release+0x46a/0x5f0 [ 664.977485] ? mm_access+0x160/0x160 [ 664.981202] ? trace_hardirqs_off_caller+0x310/0x310 [ 664.986334] ? _raw_spin_unlock_irq+0x60/0x80 [ 664.990832] ? acct_collect+0x70c/0x860 [ 664.994829] do_exit+0x570/0x26d0 [ 664.998314] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 665.003414] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 665.008522] ? mm_update_next_owner+0x990/0x990 [ 665.013193] ? print_usage_bug+0xc0/0xc0 [ 665.017251] ? __lock_acquire+0x62f/0x4c20 [ 665.021484] ? debug_object_active_state+0x2f5/0x4d0 [ 665.026581] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 665.031677] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 665.036781] ? __lock_acquire+0x62f/0x4c20 [ 665.041021] ? trace_hardirqs_off+0xb8/0x310 [ 665.045424] ? kasan_check_read+0x11/0x20 [ 665.049745] ? mark_held_locks+0x130/0x130 [ 665.053980] ? debug_smp_processor_id+0x1c/0x20 [ 665.058659] ? perf_trace_lock+0x14d/0x7a0 [ 665.062918] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.068455] ? check_preemption_disabled+0x48/0x280 [ 665.073511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.079048] ? check_preemption_disabled+0x48/0x280 [ 665.084063] ? debug_smp_processor_id+0x1c/0x20 [ 665.089076] ? perf_trace_lock+0x14d/0x7a0 [ 665.093305] ? zap_class+0x640/0x640 [ 665.097014] ? lock_is_held_type+0x210/0x210 [ 665.101420] ? kzfree+0x28/0x30 [ 665.104697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.110321] ? zap_class+0x640/0x640 [ 665.114032] ? find_held_lock+0x36/0x1c0 [ 665.118098] ? memset+0x31/0x40 [ 665.121453] ? find_held_lock+0x36/0x1c0 [ 665.125518] ? get_signal+0x95b/0x1980 [ 665.129405] ? _raw_spin_unlock_irq+0x27/0x80 [ 665.133906] ? _raw_spin_unlock_irq+0x27/0x80 [ 665.138437] do_group_exit+0x177/0x440 [ 665.142323] ? trace_hardirqs_off_caller+0x310/0x310 [ 665.147420] ? __ia32_sys_exit+0x50/0x50 [ 665.151487] get_signal+0x8b0/0x1980 [ 665.155202] ? ptrace_notify+0x130/0x130 [ 665.159260] ? sock_sendmsg+0x120/0x120 [ 665.163242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.168776] ? iov_iter_init+0xe5/0x210 [ 665.172748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.178282] ? __vfs_write+0x121/0x9f0 [ 665.182213] do_signal+0x9c/0x21c0 [ 665.185750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.191401] ? check_preemption_disabled+0x48/0x280 [ 665.196462] ? setup_sigcontext+0x7d0/0x7d0 [ 665.200841] ? task_work_add+0x123/0x1e0 [ 665.204941] ? exit_to_usermode_loop+0x8c/0x380 [ 665.209607] ? exit_to_usermode_loop+0x8c/0x380 [ 665.214272] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 665.218865] ? trace_hardirqs_on+0xbd/0x310 [ 665.223189] ? do_fast_syscall_32+0xcd5/0xfb2 [ 665.227686] ? fput+0x130/0x1a0 [ 665.230969] exit_to_usermode_loop+0x2e5/0x380 [ 665.235544] ? __bpf_trace_sys_exit+0x30/0x30 [ 665.240040] do_fast_syscall_32+0xcd5/0xfb2 [ 665.244351] ? do_int80_syscall_32+0x890/0x890 [ 665.248921] ? entry_SYSENTER_compat+0x68/0x7f [ 665.253492] ? trace_hardirqs_off_caller+0xbb/0x310 [ 665.258503] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 665.263333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 665.268168] ? trace_hardirqs_on_caller+0x310/0x310 [ 665.273174] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 665.278178] ? prepare_exit_to_usermode+0x291/0x3b0 [ 665.283183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 665.288019] entry_SYSENTER_compat+0x70/0x7f [ 665.292411] RIP: 0023:0xf7fbea29 [ 665.295764] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 665.314656] RSP: 002b:00000000f5fba0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 23:54:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:00 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r0 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r0) 23:54:00 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)) 23:54:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x68000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:00 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0}) [ 665.322352] RAX: fffffffffffffe00 RBX: 0000000000000003 RCX: 0000000020000100 [ 665.329606] RDX: 000000000000ff5a RSI: 0000000000000000 RDI: 0000000000000000 [ 665.336867] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 665.344122] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 665.351379] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:54:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:00 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8990, &(0x7f0000000000)) 23:54:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x700, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:00 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:00 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8941, &(0x7f0000000000)) 23:54:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2001005a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x2, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:00 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:00 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8904, &(0x7f0000000000)) 23:54:00 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0}) 23:54:01 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8942, &(0x7f0000000000)) 23:54:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x20000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:01 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8949, &(0x7f0000000000)) 23:54:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x500, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x7f, 0x6, 0xff, 0x8, 0x3}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r2, 0x2}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000300)={r3, 0x3}, 0x8) 23:54:02 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 23:54:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x4c00, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:02 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0}) 23:54:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6800, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:02 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8993, &(0x7f0000000000)) 23:54:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:02 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89b0, &(0x7f0000000000)) 23:54:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x7a, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000000) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x4000028, &(0x7f0000000080)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x1, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)=ANY=[@ANYBLOB="01000102ff01"], &(0x7f00000017c0)=0x6) 23:54:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:03 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8937, &(0x7f0000000000)) 23:54:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x300000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:03 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0}) [ 668.518863] IPVS: length: 28 != 24 23:54:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x400000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:03 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8927, &(0x7f0000000000)) 23:54:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) [ 668.683331] IPVS: length: 28 != 24 23:54:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x7a000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:03 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8918, &(0x7f0000000000)) 23:54:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6802, 0x10000) accept4$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000300)=0x1c, 0x800) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6000000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:04 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89a0, &(0x7f0000000000)) 23:54:04 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0}) [ 669.384983] IPVS: length: 28 != 24 [ 669.424229] IPVS: length: 28 != 24 23:54:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x74, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:04 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8924, &(0x7f0000000000)) 23:54:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:04 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8971, &(0x7f0000000000)) 23:54:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) 23:54:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:05 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8910, &(0x7f0000000000)) 23:54:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x4c, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:05 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0}) 23:54:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x3, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:05 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8983, &(0x7f0000000000)) 23:54:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6800000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:05 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89a2, &(0x7f0000000000)) [ 670.877986] IPVS: length: 28 != 24 23:54:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/ip_tables_matches\x00') getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000002c0)=""/197, &(0x7f00000003c0)=0xc5) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x4800000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:06 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x894c, &(0x7f0000000000)) 23:54:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:06 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:54:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) [ 671.386050] IPVS: length: 28 != 24 23:54:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x2000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:06 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8992, &(0x7f0000000000)) 23:54:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x60000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:06 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0xc020660b, &(0x7f0000000000)) 23:54:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x60, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e22, 0x401, @mcast2, 0x5}}, 0x3, 0x9, 0x6, 0x5, 0x2}, &(0x7f0000000780)=0x98) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000007c0)={0x0, 0x3}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000840)={0x0, 0x8}, &(0x7f0000000880)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000980)={&(0x7f00000002c0)=@in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0xd}, 0x80000001}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000380)="a41fd75fabe23f292c70ea7a1e730f200e419580de04804d3984bd062ed2b9642967b645ef16eb5551ff422215542f55e3dfe073e2bda27bc213e1a1677aec3b602f45647c9bf537662fed8310f8e2aac2c19bc9557744be3b9537c9443006b442bd96e82466286e65a22a9384604c077fa30e991e7a2d090fb3bd5e669c2dd7c1e8ea89674fbd337611243484655084cf0402604b2d2549594d8173f131efa6b613f779765ab7396439bf27352bb94ba6f9ea099b8bfb799c2b9e117c", 0xbd}, {&(0x7f0000000440)="643fd9d4cdd745e919a4d5567c29dc4bdc6061ddd960b54440449e9ea8715659433e72118d331c713198493661599a2716fc44ce106de29a07b2151af70ff32dca240eff5ce9c9e2101623ff5ffaa8d7b0374ae43896f3aac72d6bdc0849acb5e71c02795e1980ef7028df99ba5299", 0x6f}, {&(0x7f00000004c0)}, {&(0x7f0000000500)="d1c569b1f23aaac476935546ca4645993e56c38a0411de18f8d45438da03f48903a67b99670eddabd1b00d360607d829ba050657e42d9025acf7a21079d22b45f68f31296bd1442314896c27f72fa073f9293b9ba2f2828fe114586cef99f9bf77b42e8227dd44f43ecc8360c37e29271b3f9f0461a07aa86c2473708e5c13f6f11c25e7bde9506775a174a7c07d", 0x8e}, {&(0x7f00000005c0)="c8d4abaf955bb7d5422766f4c430ff6b48c5f7555e506c59815216020c4b05d275f10b6c886d38853a95abd712c8c2c23d10e583390e8474bed832fd88fb5777c1adffcd1f09ef811a18f684813cef002df3a235e5747363e523ea9b1c421ebf39a7d392252fb1d4e47d41266e357e1f134fc9c180e617cb2f08bc2f5c2f5ffb3e301a00833366d35e787d3054acf197d8ab34c233fa5886b678730f39aed7c92dd2ec84e12d50baf1bf4ecb87e6ddaa083f8a14eb5c", 0xb6}], 0x5, &(0x7f00000008c0)=[@sndinfo={0x1c, 0x84, 0x2, {0x5, 0x200, 0xfb, 0x3, r1}}, @sndrcv={0x2c, 0x84, 0x1, {0x7, 0xc31, 0x1, 0x9, 0xb4ea, 0x6, 0x0, 0x4, r2}}, @sndrcv={0x2c, 0x84, 0x1, {0x8001, 0xcb13, 0x8009, 0x5c6e, 0x3, 0x4, 0xf1, 0x0, r3}}, @init={0x14, 0x84, 0x0, {0xf78b, 0x9, 0xfffffffffffffffe, 0x100000001}}], 0x88, 0x800}, 0x4008005) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x40, 0x0) r6 = eventfd2(0x3, 0x801) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f00000009c0)={r4, 0x9161, 0x5, r6}) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) unlink(&(0x7f0000000240)='./file0\x00') ioctl$KVM_REINJECT_CONTROL(r5, 0xae71, &(0x7f0000000a00)={0x5cc3}) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000a40)=""/182) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000b00)=ANY=[@ANYBLOB="f00000004856cd944aec5090"], &(0x7f0000000300)=0x6) 23:54:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:06 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8947, &(0x7f0000000000)) 23:54:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6c00000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:06 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:54:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) [ 672.276670] IPVS: length: 28 != 24 23:54:07 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89a1, &(0x7f0000000000)) 23:54:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x4000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x7000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x1000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:08 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8901, &(0x7f0000000000)) 23:54:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6c, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:08 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:54:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000240)=0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/audio\x00', 0x400000, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000b80)={0x14, 0x49, 0x2, {0x10, 0x0, 0x7}}, 0x14) process_vm_readv(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)=""/130, 0x82}, {&(0x7f0000000380)=""/20, 0x14}, {&(0x7f00000003c0)=""/138, 0x8a}, {&(0x7f0000000480)=""/202, 0xca}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/230, 0xe6}, {&(0x7f0000000780)=""/156, 0x9c}], 0x7, &(0x7f0000000b00)=[{&(0x7f0000000880)=""/121, 0x79}, {&(0x7f0000000900)=""/227, 0xe3}, {&(0x7f0000000a00)=""/245, 0xf5}], 0x3, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) listen(r0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) write$P9_RMKNOD(r2, &(0x7f0000000bc0)={0x14, 0x13, 0x2, {0x18, 0x3, 0x8}}, 0x14) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f0000000c00)={0x5, 0x400}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:08 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8994, &(0x7f0000000000)) 23:54:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:08 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5450, &(0x7f0000000000)) 23:54:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0xffffff7f, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x600, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:08 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89a3, &(0x7f0000000000)) 23:54:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x700000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 674.111775] IPVS: length: 28 != 24 23:54:08 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:54:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000f80)='/dev/dsp#\x00', 0x200, 0x2) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000fc0), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xba, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:09 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0xc0189436, &(0x7f0000000000)) 23:54:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x3000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:09 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8995, &(0x7f0000000000)) 23:54:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x500000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:09 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x40049409, &(0x7f0000000000)) [ 674.611575] IPVS: length: 28 != 24 23:54:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x68, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:09 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:54:09 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8936, &(0x7f0000000000)) 23:54:10 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8940, &(0x7f0000000000)) 23:54:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x100000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000240)=0x8, 0x287) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:10 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 675.486382] IPVS: length: 28 != 24 23:54:10 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5421, &(0x7f0000000000)) 23:54:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x4c00000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 675.691694] IPVS: length: 28 != 24 23:54:10 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8905, &(0x7f0000000000)) 23:54:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x2000000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 675.876117] IPVS: length: 28 != 24 23:54:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x2000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:10 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000000)) 23:54:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x5, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x100) ioctl$TIOCCBRK(r1, 0x5428) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:11 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8906, &(0x7f0000000000)) 23:54:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x4, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:11 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="84a252138d5631ab2e85274a66aa9d692f613c202461cad9fac4b0f64b4274b6ff8b35d8025b4c747a48ed4b8bf5a5febab55b4833e75e05bf115bfdd9cea3cace34f234c3adc577c40644168ed16eab1e21", 0x52, 0xfffffffffffffffc) r2 = request_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='em0,\x00', 0xfffffffffffffff9) keyctl$instantiate(0xc, r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6c6f61642064656661756c7420757365723a2f70726f632f7379732f000000072f6578706972655f6e6f646573745f63f65d6e00203030303030303030303030303030303030283a37200000000000000000"], 0x52, r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:54:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x7a00, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:11 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5460, &(0x7f0000000000)) 23:54:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x7a00000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 676.817571] IPVS: length: 28 != 24 23:54:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x4c000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:11 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8955, &(0x7f0000000000)) 23:54:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:11 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89b1, &(0x7f0000000000)) 23:54:12 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000140)=ANY=[@ANYRESDEC=r1, @ANYRESDEC=0x0, @ANYRES16=r2]) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000300)=0x14c) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x80000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) mprotect(&(0x7f0000104000/0x1000)=nil, 0x1000, 0x200000d) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)=ANY=[]}], 0x1, 0x4010) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f0000000240)=r5) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) getpeername(r3, &(0x7f00000005c0)=@hci, &(0x7f0000000680)=0x80) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) accept4$packet(r3, 0x0, &(0x7f0000000bc0), 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, 0x0) getsockname$packet(r6, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ec0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000f80)=0x14) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000001040)={0x0, @multicast1}, &(0x7f0000002080)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000039c0)={'bond0\x00'}) getsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000003a80)={@local, @multicast1}, &(0x7f0000003ac0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000004100)={{{@in=@remote, @in6=@dev}}, {{@in=@dev}}}, &(0x7f0000004200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000004240)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000004340)=0xe8) 23:54:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:12 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8912, &(0x7f0000000000)) 23:54:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) 23:54:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x300, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:12 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8913, &(0x7f0000000000)) 23:54:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x4800, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x48, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:12 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x894a, &(0x7f0000000000)) 23:54:12 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x340, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f00000000c0)={0x3, 0x5, 0x3, 0xcf9, 'syz1\x00', 0x8f}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x9, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x20, 0x200000) fstat(r2, &(0x7f0000000200)) 23:54:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x48000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:13 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8980, &(0x7f0000000000)) 23:54:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x1, 0x0, 0xfffffffffffffffc, 0xe8}]}, 0xfffffffffffffeab) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x7, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:13 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)="2f70726f632f7379732f6e65742f01000000000000006578706972655f717569657363656e745f74656d706c61746500", 0x2, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x2, &(0x7f0000000140), &(0x7f00000000c0)=0xfcfca5cd4cfcb6b5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = getpid() getsockopt$inet_tcp_int(r0, 0x6, 0xe, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ptrace$peekuser(0x3, r1, 0x5) socket$bt_hidp(0x1f, 0x3, 0x6) 23:54:13 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x402c5828, &(0x7f0000000000)) 23:54:13 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8943, &(0x7f0000000000)) 23:54:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x7400000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:13 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8931, &(0x7f0000000000)) 23:54:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 678.731676] IPVS: length: 28 != 24 23:54:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x200000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:13 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8953, &(0x7f0000000000)) [ 678.903551] IPVS: length: 28 != 24 23:54:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = dup3(r0, r0, 0x80000) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000440)=""/35) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000480)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000004c0)=0x1c) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={r2, 0x8}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='bic\x00', 0x3e7) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0xffffffff7fffffff, @loopback, 0xffffffff}}, 0x1, 0xa22f, 0xfffffffffffffff9, 0x20, 0x5}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000380)={r3, @in={{0x2, 0x4e21, @multicast1}}, 0x6db, 0x8, 0x16, 0x80, 0x63}, 0x98) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:14 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8970, &(0x7f0000000000)) 23:54:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x74000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:14 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f00000ae000/0x3000)=nil, 0x3000, 0x80000000000001, 0x1013, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000100)) 23:54:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:14 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000000)) 23:54:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6c000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:14 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x0, 0x1, 0x8}}, 0x14) fstat(r1, &(0x7f0000000200)) 23:54:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x6c00, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:14 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x101, 0x40) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x31) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)=0xb1, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x600000000000000, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:15 executing program 4: r0 = socket$kcm(0xa, 0x7, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc010643a, &(0x7f0000000080)={0x0, 0xffffffffffff8001, 0x23}) 23:54:15 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x41012, 0xffffffffffffffff, 0x400000000000000) fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f00000000c0)) ioctl$sock_netdev_private(r0, 0x99, &(0x7f0000000100)="9c624028a6c0bc6e97a0536c4b447e92633f7645f0421ba199d4805324a7597cb4b6a78413488e9b2dcd13391f34d4f89be22a8516c20bc59f04c9307d8dc48dfe47a602558925f6792e585c8c29fe10d3335e32fb479086848e263e1da4d0e4fbe3ed335d2822824ce2ea0224fcbfbffac2d9a4bcd94cb391bdfcfb1a53f68a08") ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfff) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000001c0)={'veth1_to_bridge\x00', {0x2, 0x4e24, @multicast2}}) 23:54:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) [ 680.531650] IPVS: length: 28 != 24 23:54:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x487, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:15 executing program 3: r0 = memfd_create(&(0x7f0000000080)='/dev/ptmx\x00', 0x6) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000000c0)=""/216) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000001c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r2, &(0x7f0000000200)) 23:54:15 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80000, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x3f) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0xa400, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:15 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0xee2, 0x20001) futimesat(r0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={{0x0, 0x7530}, {0x77359400}}) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="01000000faff8b66966dafa9ecde742b2f30c832b9ae29da8973c6046c2cfebc62c334fafc021279a83f096d15328ad40bf30845bd5e4938b7ba634b2e532a170def362bb240c1128b8bf599c1967f673b3b21d2c6caca4bf5e6fb31032eb5588aeeccfc283e6931507bfa13386b13c503c1b8cd7267c2e01f58dcf515e630aa9647a3c4213959e17e3aec108753b5976d273088"], &(0x7f00000017c0)=0x6) 23:54:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0xc, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:15 executing program 4: r0 = socket$kcm(0xa, 0x4, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0x0, 0x2}, 0x14) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) sendmsg$can_bcm(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x1d, r3}, 0x10, &(0x7f0000000380)={&(0x7f0000000300)={0x7, 0x410, 0x0, {0x0, 0x2710}, {}, {0x0, 0xbf49, 0x4, 0xfffffffffffff6a2}, 0x1, @canfd={{0x4, 0x40, 0x9, 0x1f}, 0x3c, 0x2, 0x0, 0x0, "07fa00261a6a4295d83d9c9bca1fdecb62f9658803fcfff6b6584704336690deac35c3c5ee99f5db8e681a6ea3b25a2cbb78cfaee23366855af071f069ebda43"}}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000010) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x30, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) r1 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x408000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="1c7c272259f4f14c98c11af9529f9e51d47a034831c96f38c484dc", 0x1b, 0xfffffffffffffff9) request_key(&(0x7f0000000300)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f0000000240)) 23:54:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x60, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:16 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f00000000c0)={{0x3, @addr=0x7}, "835f03a55950e4605dac2dad66b1ddb9d1c6e333c832f8d15fc7995c91dd63b0"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0)="732fc3acce09754ee7c4f0dc1751c0261f2e5b3832b0817883a055f9670b59468db1f3ead87d358ea7c22b4c084205cfb4621ec9355f4740e3a33260ac49519fa720ff95d0c827a8cecf1b68399edf752753fbee2bff220f7fd893269645e55f4d724e2d89f08fd941fb5dfd5c856cee5efeafe0325c3bdceff4d445522b3b3956980d1df7d589a7ea7aa5ad6a6b5e36cb7669f378d1e78a1c464f83442220f44d0e9a3169221a2b8a24187c7e3b1a87f50c77f1b37fefd62a71aa115db3dda98a24819185497a870602709b3cc2e0a72eaf0244077e2f1cfdb158041e0d1eb10bb4a40531dca6f7108a66de9f9250a909796afc", 0xf4, r0}, 0x68) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xffffffffffff7fff, 0x10041) ioctl$TIOCSCTTY(r2, 0x540e, 0xfffffffffffffff9) 23:54:16 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) getsockname(r0, &(0x7f00000000c0)=@hci={0x1f, 0x0}, &(0x7f0000000140)=0x80) bind$packet(r0, &(0x7f0000000180)={0x11, 0x10, r2, 0x1, 0x7da9, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) 23:54:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x8, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:16 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:16 executing program 4: r0 = socket$kcm(0xa, 0x4, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) poll(&(0x7f0000000080)=[{r0, 0x20}, {r0, 0x80}, {r0, 0x100}, {r1, 0x8200}, {r1, 0x240}, {r0, 0x80}, {r0, 0x80}], 0x7, 0x5) 23:54:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x12, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0xe, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_EPOCH_READ(r1, 0x8004700d, &(0x7f00000002c0)) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000300)={0x0, 0x3, 0x1, 0x3, 0x0, 0x4}, &(0x7f0000000340)=0x14) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r4, 0x7}, 0x8) 23:54:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x483, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:17 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2400) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0x9}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:17 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) fstat(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000005c0)={0x7fffffff, 0xacc, 0x292, 0x0, 0xb0e, 0x2, 0x7, 0x5, 0xaa4, 0x5, 0x9, 0x0, 0x0, 0x95, 0xffffffffffff7fff, 0xffff, 0x8000, 0x8000}) getresgid(&(0x7f0000000480), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x7}, [{0x2, 0x0, r2}, {0x2, 0x4, r3}, {0x2, 0x1, r4}, {0x2, 0x3, r5}], {0x4, 0x1}, [{0x8, 0x4, r6}], {0x10, 0x2}, {0x20, 0x4}}, 0x4c, 0x2) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x400000) fstat(r1, &(0x7f0000000200)) 23:54:17 executing program 4: r0 = socket$kcm(0xa, 0x7, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x14, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x19, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0xfffffffffffffab1, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000002c0)={0x2, 0x0, 0x3015, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) ioctl$KDDISABIO(r0, 0x4b37) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:17 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x404080, 0x0) recvfrom$packet(r1, &(0x7f00000000c0)=""/98, 0x62, 0x40010102, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x400, 0x6, @dev={[], 0x11}}, 0x14) 23:54:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x13, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:18 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x8003) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) sendfile(r0, r1, &(0x7f0000000080), 0x200b8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:54:18 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) memfd_create(&(0x7f0000000080)='vmnet1\x00', 0x1) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x410600) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1}, 0xffffffffffffffc9) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x482, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 683.517018] IPVS: length: 28 != 8 23:54:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x85, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x9, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:18 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x20100, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000010c0), &(0x7f0000001100)=0x4) statfs(&(0x7f0000001200)='./file0\x00', &(0x7f00000012c0)=""/50) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f00000000c0)="6c99186395ab3175ad5dcacb54e84deb412faa8591003cf89013dd3fa0ca732d95491cca7c2e7d51986dcb0fecd9c31a42d44bc1ec73c7a90b7637f6052904237c5c2d508807bbe9316a90a55f1cc6ded648303d07f9e0a2825f3b12ea4602af3878140b867e3c8fb54525f76999c4ba22edef31364f0fe78230be359e8fac93ec0c4751786dbd7ea75a9752a80afa9f049b15058e972adf079c6d16e4186574d11f3fea1baa23e496dbea76f66f52661185da5c1e630a4d312f6fbb8b1984db373bcd55d37e269d0731b3764968cacd2bfe4a1325b63969063cb265435c045c6eea5435382da52233167868bd7029ddfdff05fcd81a5afe8c43204c6e99374fb78c85faa022b6e7bbbce3345f6d8a90275c4fac508ffb6fe459bc92961bf9d35b41df280c0027b5f402aa0bb627b1626e4492b5723142530a10393847fe94d24a7fc807c124da377d3a931dbaa84a94f8da22251fdeebe354b57e944f17fd493f0a3a895901f423b79a5737b6fc73132d237f1b35dc287d5ba2237fe3f0b501c0fe791685912cfc2de95ca73e630fac3bd1a5f10fb1bef6b212ddc524b29bf0a3066ab84c23fc924590dfc99feea2731d7e6ff1b0426df138a6bb67f4610efb3321c8dc5d6bb4d1e94ca27443068a11e76f2c4507da34cdb66a0393ff3e5c082f53e35719842c508ea299c3c84792e7d9775dd0a81a7f7a8e7af0ea09cb7d90aa3a6c5d5380475890a1d72946e2f2d389bcb6faa8d42dc69861e320a4ff39d7c606825669f38ab87297199fa732053e023afc8219c433fafdfaea8f21f29e7468ffb4026d4940905c73097d28206449498615025072502c81cf9e3fab4176b72e113eb8d0505498401f80d37c9d023f79ea90cc8a96fa843795d9f8022a2a085d4aedfc49b22dc0ea26b11059a70af7d50cc0658a4c3b387264df61d143868c0869222ef8cb9bef6142b73ce2ea917239d44372b22dc67ff181a2ca10a29ddbeb318af56fecd222375e9d2501b81b31e82352fe2b6c523701a8824104f09a771e2fc1a4b2c458dc274dbdac9ef9dd60a4445971ef436434ecfbb97edb2dbb64061861787bccff155679f0e6595b318e1685968bc15ece7888ff5d6243cabe2a0e57128a79cf7135f84cd72c896ecc65d61019a80da25c91f424fd5dfcac8f7328576f35b0bfe667107562a8004acf9b746efc8c1cc747ccd37dc07717606f1cd6ce81b525065a0be86503fdad36d29e137dbe8f47ccbf38f2fdb117ee76705e8058129dccb14cef87e1a0901fb38d984cefff5f2d8c0638d1245ff90eed7955779d1381896484b87206819a0a1bd77f662b8e420ce4aeefa4e0d60754df34d17d745e9d73a7517d1a49b959c783b5cafe6b4cbfd2976a2dc55add8115b6b9db306239d790586980205d4fc1a4139cd649c420d05671bb0aee0412e15f3aea81660efda695ecd5a9c4ccc5586c7ea1d9e2760912bbe8bd38bb11e0e547685665b0de62f3f6762fb7c52a74a069cedca5993b9c1964ad9c28a0fce0d76be577fcb9ba68332c39f3eb338de8c5a48e9369eb86281750303a74e100606c747dda7ad6e1cc500d6420d76eaaa7075a0934f9d98cc8298953cdf36dcb85a7fde70e99a495d32782d28432d00c9d584af3b572987ddb2c6100ab49ea7271c282be28f69801f16ca86d1c62acdba188197337c3dc8ca063f3da90058710462ddc80d20591a5e35f93617cef0e24b353a4571fadbb0d40e8336d2b8812f442bb84f18b1214ec679672ff585554766b362820ad8fe8f0c7c323cb90dce400bf20042ba0a53f6cf2199bf1601c4ca641f4ccf0ac2455aa80b0d35b6bc72a6797d6fa095a8c0a6c6c79fe8d0bf5965936e19d62993f8802dd8e6048ad305f486b79900346fad55bdf4fdebc89c4755da87fd148451b41122c5776906de0e6ed0cc4f360f29a814cffa3e4504690edd2e7bac8a50cf1006c6c8daedbdca8d7cb0debd118334250eb1642f8fb88c54045f80e16ca4ce4aabe3ee1c9df637957ce699904d967deca07b38beb4767bcbf4c1a710c525a9c64958d0e33ef3aefe06c52b8e9888f0d915d41c5694ee6786a8b0df364af1fe6824f342b2b539a6fedc03ba2ca15b5a005ceaa0d99805db369b384626f118ad802144b952278372979b36f7924a176242dfb715128a78402e2669bc93bdcab07d0cdaefefd4ae004fc23ad95d401c22999b447f35724d88611e3c05e59b0d459f7572c3e1069bad05073da4c98563ecaa1c2da6de6c9c8ce8eae09108d2dd98fbef52b35c099c778c9883f08b9bcc9ac293fb8c1434b3a32acac467843943ad5118b5eba8ca28801a2ceb72e221f0bbccf63606204dd92a2d34c6c76b9aebecd7ded057aef952329c1201c63f38ec6069f12f16b1abdca97073f940e2898425264f21f03bc25bc48bc1fb98eeee7cd307e30e69a7254c7a99a8773adc21d81689a5a87cb1837415344ef320bda7248c37b5676b6fdb0856b7b8b1986957f884e1ee0fa0b0d44c94725da750720970723d9f480f4023fdbe3041b3b89ec5c6552b1cd5f652cb9ac0b122894784a0ee23dacb32c41607a3aef29b07652ecf4ae7e37d99c7b6183aceb7a539f4550e5c3e9455fed9e3e68bf0f46bbaa026d46e626ba6986fe3977a5adcf4ecf0e3c2dd218fbb00ec72621b6131e0a7d0cf966e11f56a9ef8c1caf136499438241819d2145427d045d4797971e5bd8b05491bc5e94bfacf1c0abb20ef1eb3fc5fc7affa893285d3de337795a99866aa0eeab39a90819cb6a68fc889db1841304876f1a33c49f6396045302b5aa1ba4d98134fbd8ce9ceabe94754ffc9f74a77245c6f65fd254b09c7fc6a1fc81983cfe49d52757f382ba3840956029dd39e5241d5ffd5d5255d16ce553740088933f4c825a7b336bb96702b4e43d2fbb5057d424117c6af6aff393c8b312321797201cf82869f4648ce0df5894fbe928af65524068a295b44ce1e735fbbe37169fffb50e56dbbec5fd91f41017769238c2b635cfa4e36a13222cbbafa5bd7a88136b180aeae834a2e6a9af0c120726b337cba0520dbb907ad39e9d47b0f53624485aa2dcf156f6199c6ebc15c70267e792362548abd0860057991ad78974809da0f450532a538f67895492fe7dfef12321c6725aaa75e5d347d18caeb336ba495dca8b471ca9f04450fd1e22a6db045879d2d2fba040b8a831fc4dc27208f2cfece11e2cf384c4ddbf592b8c15eacabea2b5a0f1d79b2df605742552fd5ff8311dcdf34cb6a24fc14475d4280b0fbdbda74cce3a6a27abb19c9f017508ace6c943c405974193e5045136beacfff5657606ca2cf66a702d70bb0296dc091a6665b3c8ebe8c0f0f0b39546edf47ac5055cf11506d6a55efe98b97d85f750f35a9754fe40212c0a351ce08191e76852c98db1a8e36319cc25e05613eb10864df64f63ad1e8d46bc39c7546f19ffcb5de1b077e7a0f3c2b43f3b798a0dfa7d8611aea23c39928e91f74169dd98534f2f2150ec6f028c80fc6c8a17981cb91f34120f2e9fd26cc08b943c7d365ea95ec79b548de00c0de43eee32c2545b65ba3efa5f30292764b8fed4775522bdf87481fadd0fb2de982b9c18ed3bfc3d63056f83512943a34b2b81a347c170dc21db9a107c4421556367e966ef25db79282ac1bad86181ce033642f6489c5a3377c5054c5b71b50acb8da16539b5edb6854dfc76feb30413011ec163b02af3432b3d33f79f4ad7e64be51d424684012c40697b4d999c3d986051d8cab7ffbc3269357fafaaef2923519e9600e40f744a45fa9a6a60aecda00ccd0e31b1c1356b800b7075a6b5b5ee862fdc7186a93ba515bd027381b02df5f7ce807a3dcc6d9b247010bfd465d80cde75f9a5196d258d3d11c9b835bb047aed75b59e5334c7a42fc045e749dbcef1e027500568da1b7e0e9f94ebe4af30bdfd63db578ba07e69226821258c965572d2343fff2b116ffa466df51e9bd25f0508ecbb03a141cdfbba61f793a5179c9d4dc11155eb184e1e905895e46e47cf68720d572eb6ed43fd20042f1933ab347d6e43eeea2744ea1ca680b7d5383c90e1fe50517f2592e179cc7018bb19b353f6eb9d4cb869245046418b3564156c3e249ded35df87bc592a37502739f5e66b780288fd8a665701313a161c49f26ff5c065e5839b511bcd204a3a6010702adac40a7cfb7eedb45712749a71d5286fa09dae76208f06cc973020dac25e6497b7049a55cd1833ba5265eb18caa814d3a5f938e8aa15869afe0cf590da5669dd9f6894b99a95f46620d72a7cb7954af7fa5c389c611859d8f41a496c804563cb4f237fb2a216d115ae79e7a97ad0c8c8d0e801642b806909a9c349768e450b0ad5eb860459461b395e861aef7407c145ea085dd9554dd32176f77c57f3ea724f53dc4db0fb8af00b48a9b85efe8f4a5dd299356d18663f4a01e291277a94e4ea1a280d9a683eba22d0447f3bf46ae45c569f216d419379d9017221db9bb2a836c2a18c8754240462358155f90aff9a76b46eae447e4527c08b79f7406277bba779c14e074bbc513fd2536e46b15ec4753edbe2cce0aba9e0f8834fa79210200056eb83ccb9671308f9d8999c275cfba22f1856731f8517f0edbc9b6bc775973df6f798cfe98f25fae543068ffa3a04377dab35a2ea4c562ad1a0e29af15d4a00e5808b140de7c2957e09d74be002f591c146f1ff2cdfe33fb1d2e9f8684e35a0d5ae5dfb0a45ed8e96e7d4122ec4010f85c2613ba3ac7ae3dd8d4660d6bde39037ca30aedebe28eea085961143d79aa20c51402808862b6f756b11da838a25a0cfa5cd746c4378af44484f8646156743f02315c89e0a80881d8ba677cf998180f9a46033c32cacc7f891cab7c00afa779f34aee4b50a114860558584123eabcff322b29c2fa68a11dc31f9ae159ab44b8977119f87704f32b99ec38601ca11176c2a782f844ad0f927390e850ba87d5e25f3d9b8ab41236c323028c0d51d42661a32a053fe85dc192227d2b7b5b9e48cfd5cdc1b6a3babf31a2f7e66a06b65defc88283020d701ae3c463b54701acdea9e94f7aca414b459c59ee39aaa4499ac965c9cbe18609a35a49deab4a07d21db9a0e97081090dfec9a8c78ae6998a1a077197bfcd198129bba0809fdf520b4dded706691c738961d09e9f11756a6a3e9c58b03e33fd99cd9e85d158baa4c53f588d10af9f5d54d21728ebfdecc52203c2f76276e0eba44df0f387a1a7e91df6b89577db680964e22bf75e9bea232594e54ede5aa6ea6165af118b384135c9b7d682990cb036ff08cf46d597343f985cf7496127ade42931f7739dab7f1e52768b68e97b9c2fe24d16b4815aa38b4de3f00b17a2dddb0a459ee882933c07094f6d5c8771f99264667921968342f70615e4d4b6328d7bc7a7d4688752fc564e1a3b9df5509dccab8fa318ceece65901a23d62160b013b71cad315e3a0bf7a6e6c9c4ecd0bb43305087f14009b22a37ba18d232dd8097368ac42fa11c73e96dd01f4cadbb654927c2e43c9da3fb5b3f219a5d7885747989cd1426e035d11a4c386530b78b30c323184dacd2557edae0ed28a4e5cc143ee264e40947a0eda2cd61a5fe90b1cb1b899d216c559850d862221635b9065c74a985eea856862c963cd5659f9415ee3199158bc503f3370e39fc6b22369efd0f7b1e34d444f4a088aa3d75f28a5fb1855fcab1aa1db0aa517266200d16c15be66ec61c633600d5b4332b7e74af953038eef805ae740c3c726b3f87198865a6c52337") setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000001140)="1f4972afc4f7be6c0fc4b874af4e48bb", 0x10) 23:54:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)=[&(0x7f00000004c0)='U+', &(0x7f0000000500)="76626f786e657430656d312ed800", &(0x7f0000000540)=',\x00', &(0x7f0000000580)='U+', &(0x7f00000005c0)='U+'], &(0x7f0000000700)=[&(0x7f0000000640)='/dev/dlm-monitor\x00', &(0x7f0000000680)='}@[\x00', &(0x7f00000006c0)='bbr\x00']) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x3, 0x1, 0x2, 0x2, 0x441, 0x100000001, 0x401, {0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x1, 0x4, 0x5, 0x4, 0x8}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000440)=0x84) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f00000007c0)={0x100000001, 0x0, 0x1}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000740)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e20, 0x100000001, @dev={0xfe, 0x80, [], 0x1c}, 0x9}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e20, @multicast2}], 0x6c) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0xb, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:18 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffea0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x200000, 0x121000) finit_module(r0, &(0x7f00000000c0)='.trustedprocuserposix_acl_access)bdev\x00', 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x800000000003) 23:54:18 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000000000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:54:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x16, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x488, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:18 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) connect$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x7f, 0xfffffffffffffff9, 0x59b5d420, 0x3, 0x80000000}, 0x9}, 0xa) 23:54:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x18, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x486, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:19 executing program 4: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x800) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='\'GPL!vboxnet0%cpuset]-\x00', 0xffffffffffffff9c}, 0x10) sendfile(r0, r1, &(0x7f0000000140), 0x1) r2 = socket$kcm(0xa, 0x7, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 23:54:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:19 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000870000/0x1000)=nil, 0x1000, 0x4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000040)={{0x9, 0x4bfe}, {0x3, 0x1}, 0x40, 0x0, 0x5}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x7530}, 0x1f, 0x0, 0x3}, {{r2, r3/1000+30000}, 0x4, 0x28b, 0x5}, {{r4, r5/1000+30000}, 0x2, 0x3, 0x3f}], 0x30) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) fstat(r1, &(0x7f0000000300)) 23:54:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) rmdir(&(0x7f0000000300)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='htcp\x00', 0x5) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x2, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:19 executing program 4: pkey_alloc(0x0, 0x3) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = getpid() perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0xffffffffffffffff, 0x1, 0x8, 0x100, 0x0, 0x6, 0x1702, 0xe, 0x0, 0x7, 0x1, 0x9, 0x1ffc000000000, 0x3, 0x6, 0x8001, 0x7, 0x0, 0x3, 0x4, 0x7, 0x8001, 0x7fff, 0x1, 0x7ff, 0xffffffff, 0x10000, 0x1, 0x20, 0x400, 0x18, 0x8, 0x5, 0x6, 0xe2, 0x401, 0x0, 0x9, 0x2, @perf_config_ext={0x9, 0x6}, 0x10000, 0x2, 0x401, 0x0, 0x2, 0x7, 0x6}, r1, 0xffff, r0, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x868, 0x101000) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000140)={0x1, 0x8001, 0x9, 0x400}) 23:54:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0xa, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x17, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:20 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x41, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x7}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={r2, 0xb45}, &(0x7f0000000340)=0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x1, 0x3000000, 0x7fffffff, 0x200, 0x3, 0x0, 0x911d, {0x0, @in={{0x2, 0x4e22, @empty}}, 0x446, 0x100, 0xffffffffffffffff, 0x1f, 0x1f}}, &(0x7f0000000140)=0xb0) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x604003, 0x0) ioctl$IOC_PR_RELEASE(r5, 0x401070ca, &(0x7f0000000200)={0x3, 0x4, 0x1}) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000180)={r4, 0x8, 0xd55, 0x80, 0x4, 0x2}, 0x14) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000600)=0x88, 0x4) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r7, r8) write$binfmt_elf64(r1, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x100, 0xbb, 0x8, 0x3, 0x0, 0x2, 0x7, 0x5, 0x59, 0x40, 0x28b, 0x3, 0x20, 0x38, 0x1, 0x75, 0x7, 0x2}, [{0x6474e551, 0x17b, 0xe, 0x3, 0x100000000000000, 0x97, 0x3f, 0x4}], "5f3443d026ce3c71756123867c551968264023601c0aa5e2008be27f8569e9e0d2506add781a2788abf082f0541a3387bcf9be4c09058033029151775c139a142b92aeb5c851770305bd3445a836e849ef8189f4dba8847ce819e05c834b9694563ec41a0bd6ca1b60a20c5dabded63d975ef3c40d4033c27f9305fb6220907de7", [[], [], [], []]}, 0x4f9) 23:54:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x3, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:20 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xffffffff00000001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0x3f}, 0x8) 23:54:20 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f000097f000/0x1000)=nil, 0x1000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x600000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:54:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) fsync(r0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x21, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:20 executing program 4: r0 = socket$kcm(0xa, 0x7, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000500)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) getgroups(0x3, &(0x7f0000000600)=[0xee01, 0xee01, 0x0]) r5 = getgid() r6 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x100000b, r6) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)=0x0) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f00000014c0)=0xc) recvmsg$kcm(r0, &(0x7f0000001340)={&(0x7f0000000880)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000a40)=""/233, 0xe9}, {&(0x7f0000000b40)=""/241, 0xf1}, {&(0x7f0000000d40)=""/197, 0xc5}, {&(0x7f0000000e40)=""/90, 0x5a}, {&(0x7f0000000ec0)=""/114, 0x72}, {&(0x7f0000000f40)=""/245, 0xf5}, {&(0x7f00000007c0)=""/40, 0x28}, {&(0x7f0000001040)=""/230, 0xe6}, {&(0x7f0000000cc0)=""/52, 0x34}, {&(0x7f0000001140)=""/127, 0x7f}], 0xa, &(0x7f0000001240)=""/200, 0xc8, 0x3f1}, 0x10120) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000013c0)={0x0, 0x2c, &(0x7f0000001380)=[@in6={0xa, 0x4e20, 0x100000000, @dev={0xfe, 0x80, [], 0xb}, 0x9}, @in={0x2, 0x4e24, @broadcast}]}, &(0x7f0000001400)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000001440)={r11, 0x1}, &(0x7f0000001480)=0x8) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000900), &(0x7f0000000940)=0x0, &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000001540)=ANY=[@ANYBLOB="02000000010005000000000002000300", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=r2, @ANYBLOB="000000003f2a878e197b56af2260048d5e07ca63063ab229eda945cb64016dbbfdaee3e788e58a978d71f36330bc9c22c027fad06192b70004d42f4355f2ba4bed038c66390a000000000000123517ddc00000f7fce0264b416eaed18243c9048337b65360c93070cf49a1a3fa39abe60e1bccc1ab6c301956b89d6fb9d6f26cb50ad73c013050e8597398ba49534a3971eef47fdcd7", @ANYRES32=r3, @ANYBLOB="040005000000000008000000", @ANYRES32=r4, @ANYBLOB="08000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000300", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="10000400000000002000020000000000"], 0x74, 0x2) r14 = socket$inet6(0xa, 0x0, 0x4) getsockopt$inet6_tcp_int(r14, 0x6, 0xd, &(0x7f0000001500), &(0x7f0000000100)=0x394) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x1000, 0x1, 0x3, 0x1, 0x3ff, 0x1, 0x1f, {0x0, @in={{0x2, 0x4e22, @empty}}, 0xffffffffffffff81, 0x0, 0x70, 0x8, 0x9}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r14, 0x84, 0x1b, &(0x7f0000001680)=ANY=[@ANYRES32=r15, @ANYBLOB="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"], &(0x7f0000000280)=0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r16, 0x84, 0x12, &(0x7f0000000080), 0x4) 23:54:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x481, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x64, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:20 executing program 4: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'ip6gretap0\x00', {0x2, 0x4e21, @multicast2}}) r1 = socket$kcm(0xa, 0x100000002, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r2, 0x3, 0x2}, 0xffffffffffffffed) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 23:54:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x6, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:21 executing program 4: r0 = socket$kcm(0xa, 0x10000100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) socket$can_raw(0x1d, 0x3, 0x1) 23:54:21 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x3, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x2, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f00000000c0)=0x100000000) 23:54:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x4, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000440)=0xe8) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@local, 0x4e20, 0x0, 0x4e23, 0x9, 0xa, 0xa0, 0x80, 0x32, r2, r3}, {0x6, 0x3d, 0x1b, 0x4bf1, 0x6, 0x401, 0x100000001, 0x20}, {0x7, 0x4, 0x8, 0x9}, 0x6, 0x6e6bb8, 0x1, 0x1, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x1c}, 0x4d4, 0x6c}, 0xa, @in6, 0x3507, 0x0, 0x3, 0x6, 0xffffffffffffffc0, 0x7, 0x3}}, 0xe8) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0xfacd, 0x1ff, 0x2, 0xffffffffffff7fff, 0x0, 0xe1, 0x4000, 0x9, 0x7d592ff, 0x6, 0x2, 0x3ff, 0x7, 0x0, 0x0, 0x415, 0x4, 0x7, 0x2, 0x100000000, 0x2, 0x5, 0x3000000000000000, 0x7f, 0x48b, 0x6, 0xff, 0x8, 0x6d9, 0x8, 0x400, 0x8, 0x2, 0x5, 0x1ff, 0x4, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000240), 0x5}, 0x602, 0x100000001, 0x100000000, 0x7, 0x80000000, 0x10001, 0x6}, 0xffffffffffffffff, 0x0, r1, 0x8) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x22, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x44, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:21 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x3, 0x5, 0x9000}, 0x4) 23:54:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:21 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000080)={0x7, 0x79, 0x2}, 0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x4880, 0x0) fstat(r1, &(0x7f0000000200)) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x80) 23:54:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x31, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:21 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:21 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1}, 0x8628c7e112bb44af) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x15, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:22 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0xf3, "2eead30a747ac110038530d8fd06a36733c49494e6b84c2b2faf0bec7c02be9644e0a7d773811ce7733b3f21f013c1ab0498c4934f9ae1920704a509de8641d73b6b531cd5d8e75819b1f51bae4898a07b0e5fb66f00d7fb48427c128643e387b7496a4aae9d8d23ebf1b5d93bcbd3627a0bc7c55b51b695725f44009d7885043e3f234fe0ff4766432f824af8d0d9b0cee0eea711baa3502f62b0b453e9aa7a0d3adf1461193f4ef2dd16d556a9a40437995e6babb98fcc4d2dc5b7c8f697b525c00c75002f3752fa1aec0625fe0f366454a5f2b53bbfd1584d5fbba9c1bcf6fba66f19733d5295367b5e0174bba78c18e621"}, &(0x7f00000001c0)=0x117) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) 23:54:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x32, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:23 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x8, 0xffffffffffffffe1, 0x4, 0x2, 0x0, 0x0, 0x6, 0x3, 0x10000, 0x7, 0x401}, 0xb) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x5b, "5c3cf0bf83a8bfbf1e3d8fa5add4e45283fda1a9b0d8ab4b9ccb67ae836439ba73fd98fe45d30bec2b96776d6b41c52aad2231d84188028abdc047db81a895c3ab6423125d3c7c3aaebadab68e6be979b791106ec4bfce41428088"}, &(0x7f0000000100)=0x63) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r2, 0x800, 0x3, 0x7fff}, 0x10) fstat(r1, &(0x7f0000000200)) 23:54:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x480, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:23 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000001b80)={&(0x7f00000000c0)=@rc={0x1f, {0xfffffffffffffff7, 0x7fff, 0xc7c7, 0xa68f, 0x7}, 0xfffffffffffffffd}, 0x80, &(0x7f0000001540)=[{&(0x7f0000000140)="305c2881567bf7ba3171a5188d51a676fd7c940904e794ba4f0e731b61f89ade5e57ad9a9d0897198ca286deec4020fcab654946c5f71779ce9dc103cab17c3f04a66453e1715f7a1148c7437ed99d6fd43e3ac4cf2a6c184f6835b413255e3c25200a08e052c6c0682e252892087a12fa08451e255a5ec784d5db284611ccc8556bf10913d93448ce368a8370ad358b87790d6bb46bdfecce0a99959b3538d39b6191e7698661bc52ce", 0xaa}, {&(0x7f0000000200)}, {&(0x7f0000000240)="7372834d4de084fdfe52e6b90de29de695bc04b49a8a8517b257a6603be53a503fca73313eabe61838441114adaff5044f83", 0x32}, {&(0x7f0000000280)="416c1ad8ff4408efa56b09ac8693877b403488c4d2ac8060c53f8fc5485a3f64f5c4a11ab480c6421abd0d8eb71372eba12a9447545d97cd668d714960f6a0d0c942e571e481d25f619613636396edbdede89761f2e6b6603638f0d55c3329356c08d21d1ecd23b47e0566ea7fb39f33f5", 0x71}, {&(0x7f0000000300)="603aa45a542f4713d875d4223ad525a71cb66379cbed54d4db46ca155553f6f7bb294015992d7922306c9ac317109987552d298702bb8d844c6697782d4d729b646d06e17122f0321492f48c8f73408b1e0928ad4c5bf571d7edae74b13d396193e7938b155b15811739fbabe22e781014305f01f6fce932a31e0bae9fa4728ea1c8ef5c85d9020bf0b2fe921b48cf9d7879f76ec1c2a25833fa20f47add92eebc06ccbf4009e95e0f006997ff7c776af7b0b62040b79460b4", 0xb9}, {&(0x7f00000003c0)="c35af017cae47884909bf13cdf4ee7e683bd863321c3eb9cbff5656dc90da4bc50c1b022752e1d5ee1cc446a7f8cba4d6dca622a305e9047a863dfcf0761727dd6afc10aa0e4d4597e2936c213000a1a2ab004eb5f78c8f600ca2dc4a7e279bbb6f524341b37175b14a94cac8175e3d2ac6edf987e9915803595d9de6b773191db91de374859f7db0342bf33e99f4708d8a75fba63a7ebdf7fe0f62e6dd8621ef8a7c2a9c1d31c4d0b8981157be0cd003a71a66787bc7a9b0527551ec7355e560aaab24dec3c7671cdbe525423ac32e4e3e872a91924389d9110617c195b", 0xde}, {&(0x7f00000004c0)="0716d9370e152da6955e03ea1b63a7553730607de74bdaaa727c5ce15d4e491cfd7aca50b1bd99be274d516569e8db64db0d47be2b1f5ebee0dabbaf108c93cd9cf6cb4435709a92c345e96ee27ee5286b9ab0677e1ec3c9eb79cafd0708fa82f58e35d6b1bf55873828282947c6674277", 0x71}, {&(0x7f0000000540)="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", 0x1000}], 0x8, &(0x7f0000001580)=[{0x94, 0x112, 0x4, "b3d290c179323e9a8806649da45bf3c1efc49731f44851fb99e44aa71699f9f181a19ab12f722e0ddacb633284bffd3d1b085240b5805d40c8958ce714847201e074702e47d0412940be2bca98cfd9a93717032241925157f797dc0006d525c66937489dd68aff785f2baf5bd8fe087ebdbb48f6592a455bfa73600bc4702a72020c96ddb78241"}, {0xd4, 0x117, 0x7, "1441b74a51398f371e34056be00c022d077274f9c9ff2d315d7c9822c293001afac32bed1fa267a8f0e03e7d7bfa9a57a1220aacb109348a7157cbad2ec34db3d2ed2289692f7972cccd0b9ed4feece2df3c2c0e3c6db103cfe68ec2da2c1af050601df944809bb7b93d2511914568683a745d9d287df29f64a8aaedebe0b6d9a8c1788e81db4324c0d41d39171fd6c804ec0c88509668d9d11f97c94087234804d05654764ba14272b4f2aef642e77d810fe411167c29216c204ba4cc743ce1e2b06869e4"}, {0xd8, 0x109, 0x92, "54058feee2cdfd8b2fbe09c4b5bdd3d3bf80505017d705331ffbf2305019457406ca7934a8c38778745a58fe015b086e554975ee98c87dc4d19b7a98232ec163058d4d48663432eaa14faac5369c7121fb491ff1ee6ca910926ed6c96fdc2f3586e6ee53d93300cff6017bfe50853dd86813b207616e5504ea663576f827d16ebf3163d3c7e3cf6898f1ceb306d44f92fbdfeaf70f93e3fc451e099c081162d7bf1e691fa50313afa2a7efe3edb59353482fe90122bd253c599b72498eaa7746f9753a19d71b1451fce50c96"}, {0xb8, 0x111, 0x200, "29988baa157992b60d4e1928fc502af4be8fe9427bcbb4103ccf6562779c5df6dc1846d3c92c7f46cda35be3a6046c24118d0469f7d8155f48fe484de0ea7bb14832465803b5365e6d85eef37f5ef2a36866a4bbef6e6c2197b4bb4ad7757058146089dfcbffe1d0799d9d19b717d987a98f6a6a53425a46c48547209ea05dcb0feba825d08c9fd4b9bfd2d41e694d97586b6b6ddf482c97782be01133aed3a660dabb71a5705292d3b52096"}, {0x84, 0x11f, 0x3afc, "7cb40d571bed9c9e5cafc0090257056fd9b3f63dc54079de40cb30082c5d9bea0c88c10dab038fe1246bde880c347552dc9a0a574897942548a10cdc5d4a341cffa448518de11f0784e19544c4513a36b580be18857c10264d85419483076e6c126d7cebe2adfbb4fbd3c1331c4ab12d028af48ffd5b"}, {0x9c, 0x109, 0x1, "1bea64814791e4e6ab3d8117afde64340bd19e7653548367ca10988ad87f633ddb436acaff34151d5852b23155e9a3a798cd60549e92c534ab2dab3f3cc3b22a0507fed4c4c9e7b6948190eef3269ac91535026c9ee9fbcef46cdb8d5f73933a1022ecf66e81b7545e9cbdf88da19d42a515b9f7364c1bba33ba730079c0e71d2b0e2ebcbacebaf1cecb92500bff"}, {0x10c, 0x13b, 0x32a3c00, "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"}, {0x5c, 0x1, 0x4, "2d656316f03321ebe9d07543ca15b8f8b9c41c2ff0db3fd86a9354beecba6321b75e77b050c783ef1696de1b9747f2b5b0656cebe6ddb6c4fa93f74cfd1fa30555c42f9d7c94b83cdc2f09d82402da"}, {0x28, 0x19d, 0xfffffffffffffbff, "932a65795677729589fcb75735387d90b2607d3f99199fc76b5e6f65"}, {0x34, 0x114, 0xdb6, "dae71fbff81b51a59f8c135c96221eae49543a8fd3537f766cb978fb339552838d43e60b9405f8bc"}], 0x5dc, 0x1}, 0x4) r1 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={r1}) 23:54:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0xd, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:23 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) 23:54:23 executing program 4: r0 = socket$kcm(0xa, 0x7, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:23 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000300)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffff49, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000240)={0x800, 0x6, 0x8, 0x77}, 0x8) 23:54:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x29, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:23 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:23 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) 23:54:23 executing program 4: r0 = socket$kcm(0xa, 0x7, 0x0) syslog(0x9, &(0x7f0000000540)=""/197, 0xc5) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x90100, 0x22) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={0x0, r1}, 0xffffffffffffffa8) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f00000000c0)={r0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) fstat(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1b}, @in=@empty, 0x4e22, 0x7fffffff, 0x4e21, 0x7, 0xa, 0x80, 0x20, 0x32, r3, r4}, {0x6, 0x7ff, 0x364, 0x1, 0x80000000, 0x1, 0x1ff}, {0x10000, 0xaa, 0x7f, 0x45}, 0x800000, 0x6e6bbe, 0x0, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0xb}, 0x4d6, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x4, 0x2, 0x2, 0x0, 0x7, 0x4a4}}, 0xe8) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e23, 0x800, @remote, 0xa9}, r6}}, 0x38) 23:54:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0xf, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x7, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:24 executing program 4: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@un=@abs, &(0x7f0000000100)=0x80, 0x800) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 23:54:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) socketpair(0xd, 0x5, 0x31, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000002c0)=0x4, &(0x7f0000000300)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) lsetxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v2={0x2000000, [{0x10001, 0x1}, {0x0, 0x6}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x18) 23:54:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:24 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1}, 0x14) mlockall(0x6) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) 23:54:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x26) [ 689.862426] IPVS: length: 38 != 24 23:54:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:24 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000189000/0x1000)=nil, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:54:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x9) 23:54:24 executing program 4: socket$kcm(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/full\x00', 0x400000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000e80)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000100000000000000000000000000001f00000006000000fc0500001001000000000000100100003403000010010000300500003005000030050000300500003005000006000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ec0010010000000000000000000000000000000000000000000000002400697076366865616465720000000000000000000000000000000000000000250201002400484c000000000000000000000000000000000000000000000000000000000181000000000000000000000000ffffe0000001000000000000000000000000000000000000000000000000000000ffffffffff00000000ff000000000000ffffffff006970646470300000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000006200f30342000000000000000000000000000000c800f00000000000000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020800000006000000fe8000000000000000000000000000bbff020000000000000000000000000001ffffffffffffff0000000000ffffffffffffffffffffffffffffffff000000ff626f6e643000000000000000000000006970365f767469300000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf00700401000000000000000000000000000000100134010000000000000000000000000000000000000000000000002400727066696c74657200000000000000000000000000000000000000000000d30000002400727066696c74657200000000000000000000000000000000000000000000010000002400434845434b53554d000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ec0010010000000000000000000000000000000000000000000000002400727066696c746572000000000000000000000000000000000000000000000700000024005443504d535300000000000000000000000000000000000000000000000001fc00000000000000000000000000000000000100000000000000000000000000000001ff000000ff0000ffff000000ff0000ff0000000000000000ff000000ffffff006970365f76746930000000000000000076657468310000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000001d00020079000000000000000000000000000000c800ec000000000000000000000000000000000000000000000000002400434845434b53554d00000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800cc000000000000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x658) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) exit_group(0x400000000000010) 23:54:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x63) 23:54:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:24 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) sendfile(r0, r0, &(0x7f0000000080)=0xd, 0x8bd) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 690.175839] IPVS: length: 99 != 24 23:54:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 23:54:25 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0xa) 23:54:25 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x111000, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000280)) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000240)={0x20}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0xc6, "c08c212963db24a29301b517f63aa0e6097d9727259ce57488e85e8dc3b8d3f0697b16c5aab1f5010ee24bd4a7b668836c8da476d7783b870043d723d696184059d1911ffa6ba44a2cc7bd7f82cb26ea60d605270e97fc250d2a17fbcfef5769c59ed1f8d577f8df519449b2fd01696b156ee69093cc2052765c672963517317f79d1c452b4244b75658c3632a1ab1bcb39af2d13d4c2127749d68594676483abbb7694aa66bd4106d825ef13a6d711ac5907f788a3933d99b99610868b6a5a9de0313f24cca"}, &(0x7f00000001c0)=0xce) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000240)={r4, 0x80000001, 0x3}, 0xfffffefd) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000080)={r1}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x3, 0x10000, 0x8000, 0x0, 0x9, 0x5, 0x3, 0x2, r4}, &(0x7f0000000300)=0x20) 23:54:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:25 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, [], 0xe}}, {0xa, 0x4e21, 0x7, @local, 0x7e1}, 0xfffffffffffffffb, [0x100000001, 0x1, 0x200, 0x5, 0x7ff, 0x0, 0x3873, 0x7]}, 0x5c) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:54:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x5f5e0ff) 23:54:25 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:25 executing program 4: io_setup(0xfff, &(0x7f0000000180)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x4000000000000000}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x7, 0xfff, 0x5, 0x5}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x200, 0x0) write$eventfd(r1, &(0x7f0000000100)=0x630, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x201a, 0x4, 0x1}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f00000001c0)=""/43, &(0x7f0000000200)=0x2b) 23:54:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 690.906742] IPVS: length: 99999999 != 24 23:54:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x228100, 0x10) ioctl(r0, 0x1ff, &(0x7f00000000c0)="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") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) socket$inet(0x2, 0x4000, 0x3) 23:54:25 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) [ 691.060079] IPVS: length: 28 != 24 [ 691.081619] IPVS: length: 28 != 24 23:54:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="d6bc790000981ef736638db7cffe4c5de61760bb000016f6ff4bc4d6c534a1c6fd70e02946ebdbb6c94cdeb60cddca88880b53a6b2a6c1301f20ed54828832094a7eea64d48469fcf4c8c6d796619997a19a3d192b1b9cb8b3616e78c797889c6cf4f26d0006c4c72ba64351bb5e7a4128ade8b95de4480ea3a88f54c69e57cf7643e3d4b5ab509f9623f2145995890085d0cca2f38f6606faac24f637113edacd471e1712b8fc0fb6b70929"], &(0x7f00000017c0)=0x6) 23:54:26 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x20, 0x101000) sendmsg$nl_netfilter(r0, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="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"], 0x2f0}, 0x1, 0x0, 0x0, 0x4}, 0x4) r1 = socket$kcm(0xa, 0x100000002, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000540), &(0x7f0000000580)=0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) read$FUSE(r0, &(0x7f00000005c0), 0xfffffffffffffe03) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r2, 0x2}}, 0x18) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f00000001c0)={0x9, 0x6}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) openat$vsock(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vsock\x00', 0x1, 0x0) ftruncate(r3, 0xfffffffffffffffd) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x50) 23:54:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/28, &(0x7f00000003c0)=0x1c) 23:54:26 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000125000/0x4000)=nil, 0x4000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000140)) [ 691.869386] IPVS: length: 28 != 24 23:54:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f0000000140)=0xfffffdd9) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/213, &(0x7f0000000100)=0xd5) 23:54:26 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) [ 692.031675] IPVS: length: 213 != 24 23:54:26 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) userfaultfd(0x800) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 692.056535] IPVS: length: 213 != 24 23:54:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'teql0\x00', {0x2, 0x4e24, @rand_addr=0x9}}) socketpair(0x11, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000400)=@nat={'nat\x00', 0x1b, 0x5, 0x4bc, 0x10c, 0x10c, 0x10c, 0x0, 0x2e8, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xd8, 0x10c, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x6, [0x3, 0x5, 0x6, 0x11, 0xead7], 0x10000, 0x1, 0x6}}}]}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x8, @rand_addr=0xdaad, @rand_addr=0x7fff, @port=0x4e22, @icmp_id=0x67}}}}, {{@ip={@local, @multicast2, 0xff, 0xff0000ff, 'veth1_to_bond\x00', 'teql0\x00', {0xff}, {0xff}, 0x6, 0x2, 0x40}, 0x0, 0x98, 0xcc}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x6, @dev={0xac, 0x14, 0x14, 0xf}, @broadcast, @icmp_id=0x65, @port=0x4e22}}}}, {{@ip={@remote, @broadcast, 0xffffffff, 0x0, 'tunl0\x00', 'yam0\x00', {0xff}, {0xff}, 0x0, 0x1, 0x40}, 0x0, 0xdc, 0x110, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@icmp={0x24, 'icmp\x00', 0x0, {0x7, 0x200, 0xfffffffffffffc01}}]}, @NETMAP={0x34, 'NETMAP\x00', 0x0, {0x1, {0x2, @dev={0xac, 0x14, 0x14, 0x21}, @rand_addr=0x1f, @port=0x4e21, @icmp_id=0x68}}}}, {{@ip={@local, @multicast2, 0x0, 0xffffff00, 'irlan0\x00', 'bcsh0\x00', {0xff}, {}, 0x32, 0x3, 0x10}, 0x0, 0x10c, 0x140, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0xa80e, 0x0, 0x1, 0x2}}, @common=@ttl={0x24, 'ttl\x00', 0x0, {0x3, 0x4}}]}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x11, @multicast2, @dev={0xac, 0x14, 0x14, 0x1e}, @gre_key=0x39eb, @port=0x4e24}}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x518) [ 692.233687] IPVS: length: 28 != 24 [ 692.255183] IPVS: length: 28 != 24 23:54:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x2) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) socketpair(0x13, 0x6, 0x8, &(0x7f0000000080)) 23:54:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:27 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:54:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x74, 0x20000) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:27 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x220000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xa4, r2, 0x420, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x34}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x10000}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xad3}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xdfe}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x8040}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x410400}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) write$binfmt_aout(r1, &(0x7f0000000680)={{0xcc, 0x4, 0xfffffffffffffffb, 0x1b9, 0x1c7, 0x7, 0x136, 0x7cf}, "0b9a33510e573bd6972c2c87f00ceb9e26488fc52c03ccce8d9100c44977dc6c57af8596ad694bd9943defe2674757c671ee4a513d4f60a1fe6584a4189de1b9fd837259dd25aee67c8c9ce04c8cef5146cfc7b0b8fa86571b2961776bbad83abd2e8a768fb2cbdb96ec1fb4a4cda507a81408482de3828fb45a9294db484f2d2b299ef557c9770522b394a377daeb05fad9ae5ce273d561307c10663c8f5fa8ab6be4aeb6a54fedda74966f6fbb97f495a9f429dcb97042207cf6d2038f1c661336ed2e770722991e58277985b5ea3c1ee1cc3b4f34b4f51d6f3e3d34204eb8007d3402", [[], [], [], [], [], [], []]}, 0x804) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x2, 0x0) r5 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000ec0)={0x4, 0x70, 0x5, 0x10000, 0x4, 0x5, 0x0, 0x8001, 0x20, 0x1, 0x0, 0x5, 0x4, 0x1f, 0x0, 0x2, 0x1, 0x1e8, 0x3b, 0x7ff, 0xfffffffffffffc00, 0x17156000000000, 0x0, 0x502c, 0x3, 0x6, 0x40, 0x3, 0x4, 0x6, 0x5, 0x6, 0x23, 0x7fff, 0x3, 0x5, 0x1, 0xfffffffffffffffe, 0x0, 0x5, 0x1, @perf_config_ext={0x8000, 0x10001}, 0x8, 0xff, 0x2, 0x4, 0x7, 0x7ff, 0xef}, 0x0, 0xc, r4, 0xb) write$FUSE_LK(r4, &(0x7f00000000c0)={0x28, 0x0, 0x2, {{0x2, 0x7, 0x3, r5}}}, 0x28) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f00000004c0)={0x8, {{0x2, 0x4e21, @empty}}}, 0x84) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000480)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4018641b, &(0x7f0000000100)={&(0x7f0000ffd000/0x2000)=nil, 0x6, 0x4, 0x80, &(0x7f0000ffd000/0x2000)=nil}) 23:54:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(r0, r0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000080)=""/94) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/28, &(0x7f0000000000)=0x1c) 23:54:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) [ 692.989687] IPVS: length: 28 != 24 23:54:27 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000000006ffff0000000058b50400000000e4"], 0x14}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x0, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000001480)={0x0, 0x9, 0x30}, &(0x7f00000014c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000001500)={r2, @in={{0x2, 0x4e21, @remote}}, 0x4d9, 0x0, 0x10000, 0xffffffffffffffff, 0x16}, &(0x7f00000015c0)=0x98) recvmsg(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/108, 0x6c}, {&(0x7f0000000080)=""/248, 0xf8}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/152, 0x98}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x5, &(0x7f0000000300)=""/71, 0x47, 0xaf}, 0x40010142) 23:54:27 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) socket$can_raw(0x1d, 0x3, 0x1) 23:54:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:28 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f000081d000/0x3000)=nil, 0x3000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000040)) 23:54:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240), &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) socket$inet_sctp(0x2, 0x5, 0x84) 23:54:28 executing program 2: socket$inet(0x2, 0x4000000000000001, 0x8) r0 = socket$inet(0x2, 0x3, 0x80000000) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0xffffffffffffff9d) r1 = dup2(r0, r0) ioctl$NBD_DO_IT(r1, 0xab03) 23:54:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:28 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000140)=""/179) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000000c0)={{0x0, 0x4}, {0x2000200, 0xe08}, 0x0, 0x0, 0x7}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:28 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000000)) [ 693.926363] IPVS: length: 28 != 24 [ 693.942481] IPVS: length: 28 != 24 23:54:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:28 executing program 4: pipe2$9p(&(0x7f0000000000), 0x800) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000080)) 23:54:28 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000000c0)={0x5c54764d52e28d11, 'bond0\x00', 0x2}, 0x18) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) userfaultfd(0x800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f0000000080)=0xae64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:54:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x400) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@ethernet={0x0, @remote}, {&(0x7f0000000080)=""/144, 0x90}, &(0x7f0000000140), 0x2}, 0x9c) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, &(0x7f0000000040)=0xffffffffffffff91) 23:54:29 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x340, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f00000000c0)={0x7, 0x0, [{0xf, 0x7, 0x3, 0x1f, 0x9, 0xffffffffffffff7f, 0x3}, {0x40000001, 0x0, 0x3, 0x8, 0x8, 0x40, 0xcd}, {0x80000007, 0xfffffffffffffffa, 0x4, 0x8, 0x2, 0x0, 0x7}, {0x40000006, 0x9, 0x2, 0x1ff, 0x7fffffff, 0x7d, 0x200}, {0x80000001, 0x80, 0x3, 0x0, 0x0, 0x3, 0x1f}, {0xa, 0x8, 0x6, 0x1, 0x8dac, 0x1, 0x8}, {0x7, 0x5d0, 0x4, 0x800, 0x10000, 0x1, 0x800}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(0x0, 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x0, &(0x7f0000f40ff8)=[{0x7, 0x8000000000000, 0x1, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000380)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a45320, &(0x7f00000002c0)={{0x1, 0x6}, 'port0\x00', 0x1, 0x408, 0x7a2, 0x413, 0xfa81, 0x7, 0x4, 0x0, 0x1, 0x7f}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:29 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000140)) mmap(&(0x7f0000017000/0x2000)=nil, 0x2000, 0x1, 0x8031, 0xffffffffffffffff, 0x0) fstat(r2, &(0x7f0000000200)) 23:54:29 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x60) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:29 executing program 4: r0 = socket$kcm(0xa, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r1}) 23:54:29 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000040)={0x4, 0x0, 0x2, 0x5}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0086438, &(0x7f0000000080)={0x80000000, r1}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r2, &(0x7f0000000200)) 23:54:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 695.007101] IPVS: length: 28 != 24 [ 695.033227] IPVS: length: 28 != 24 23:54:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(0x0, 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x12202, 0x108) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080)=0x3, 0x4) ioctl$KVM_SMI(r1, 0xaeb7) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f0000000040)=0x16) 23:54:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:29 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = socket$netlink(0x10, 0x3, 0x7) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r3 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) r5 = geteuid() write$P9_RLINK(r0, &(0x7f0000000480)={0x7, 0x47, 0x1}, 0x7) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x12000}, 0xc, &(0x7f0000000200)=[{&(0x7f0000000100)={0xc4, 0x16, 0x300, 0x70bd2b, 0x25dfdbfe, "", [@typed={0x8, 0x37, @pid=r2}, @nested={0xc, 0x23, [@typed={0x8, 0x2e, @ipv4=@empty}]}, @nested={0xa0, 0x83, [@generic="e9071a3994da02885a147563494c71bb8ff2441d88e01a7a586ec08d36e7c907db5cb9748dbddf406ada16a54e4041cba7adbb43f96e9db8175beb304e7bd424781bfa0e7091ef703acfc82d278db79ada7acc501dfb775fe5139936259b491fd994adfbce4b11362a3a84e93e6ab1c460129460065680e42b58879d68d5c6ad1f19c53bddf1340d5d9792731d46fb7739", @typed={0x8, 0x38, @pid=r3}]}]}, 0xc4}], 0x1, &(0x7f0000000300)=[@rights={0x2c, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x24, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r4, r5, r6}, @rights={0x1c, 0x1, 0x1, [r0, r0, r0, 0xffffffffffffffff]}], 0x84}, 0x1) splice(r1, &(0x7f0000000400), r1, &(0x7f0000000440)=0x12, 0x6, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000080)={r0}) 23:54:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4100, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) [ 695.373892] IPVS: length: 28 != 24 [ 695.398520] IPVS: length: 28 != 24 23:54:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(0x0, 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:54:30 executing program 4: r0 = socket$kcm(0xa, 0x4000002, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0xab) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/28, &(0x7f00000003c0)=0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2200, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) 23:54:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) 23:54:30 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f00001d5000/0x2000)=nil, 0x2000, 0x1000000000000004) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) [ 695.941349] IPVS: length: 28 != 24 23:54:30 executing program 4: r0 = socket$kcm(0xa, 0x10000005, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 695.983271] IPVS: length: 28 != 24 23:54:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:54:30 executing program 2: r0 = socket$inet(0x2, 0x3ffffffffffffffd, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:30 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000500)={r2, @broadcast, @empty}, 0xc) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) 23:54:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/28, &(0x7f00000003c0)=0x1c) [ 696.342453] IPVS: length: 28 != 24 23:54:31 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f00000000c0)) 23:54:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x1) syz_open_dev$sndctrl(&(0x7f00000003c0)='/dev/snd/controlC#\x00', 0xffff, 0x22000) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/28, &(0x7f0000000040)=0x1c) recvmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/171, 0xab}, {&(0x7f0000000180)=""/204, 0xcc}, {&(0x7f0000000280)=""/58, 0x3a}, {&(0x7f00000002c0)=""/48, 0x30}], 0x4, 0x0, 0x0, 0x400}, 0xad}], 0x1, 0x2063, &(0x7f0000000380)) 23:54:31 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x400000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/167) getitimer(0x0, &(0x7f0000000080)) r1 = socket$kcm(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f00000001c0)=0x6) r2 = getpid() ptrace$getsig(0x4202, r2, 0x8001, &(0x7f0000000200)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) set_thread_area(&(0x7f0000000180)={0x3f, 0xffffffffffffffff, 0xffffffffffffffff, 0x7fff, 0x10000, 0xc9, 0x7, 0x2, 0x100000001, 0x39b}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 23:54:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000001002, &(0x7f0000000300)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) unlink(&(0x7f00000000c0)='./file0\x00') r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x28000, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000002c0)={0x101, 0x100000001, 0xdc}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) syz_extract_tcp_res(&(0x7f0000000380), 0x8000, 0xbd) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) prctl$PR_GET_SECUREBITS(0x1b) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x2) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000340)={0x5, 0x2, 0x7}) 23:54:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:54:31 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e05411, &(0x7f0000000540)=""/26) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0xe0, r2, 0xc00, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2a, 0x14}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_AF={0x8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xcdc}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6c}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0x5}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe525}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0xe0}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) connect$rds(r0, &(0x7f00000001c0)={0x2, 0x4e21, @loopback}, 0x10) fstat(r1, &(0x7f0000000200)) [ 696.743729] IPVS: length: 28 != 24 [ 696.763087] IPVS: length: 28 != 24 23:54:31 executing program 2: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c, 0x80000) sendto$inet6(r0, &(0x7f0000000080)="5f84b13fe04b7e0d4a01f45c059b2d919ae5dd6caa534d19da0ba98d631fc620", 0x20, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @empty, 0x4e55}, 0x1c) r1 = socket$inet(0x2, 0x5, 0x2000000040000) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='autogroup\x00') ioctl$VIDIOC_PREPARE_BUF(r0, 0xc044565d, &(0x7f0000000200)={0x6, 0x4, 0x4, 0x2, {0x0, 0x7530}, {0x5, 0x2, 0x100000000, 0x3f, 0x6, 0x2, "589e80b8"}, 0x6, 0xab68f77aa1f280e7, @userptr=0x3, 0x4}) r1 = socket$kcm(0xa, 0x100000002, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0xfe, 0x1, 0x8, "83492296ab7400dfc1d79f4b3baa954d", "0ae87bc70f205b1a70643cdda5fa69aaaa28ac07bc622b34bdf0b16cf81cbc19469c63596cf7ac1c99de84180d6e0d2d8e61ca07d71f7c579f96f8a64963669e0992696e7300deb51a5dfa5828ed91e070ff514c994b1250732a2161f3e798746af4d0754eb9b7f677ccff21c9d7f4b3eeb0ae6672e7e4a2fa684158643c4e0748ac4d6eb2320d841ebc16f9a628542d77fab2e5e358b303defa6e25a35b53c11e67ea54e8656f0d776bfde68c75a0f18bf1a9a282c99254f8dcf224be3d6a77f8a7f201df871d866187f5b679f4b44f9c8368b6157397cce8088a257fb3cfdd81457499e0f6039a7e"}, 0xfe, 0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100), 0x13) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="cfb5006b17dfb6ded5ae8ceaf911ad86", 0x10) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) ioctl$TIOCCONS(r3, 0x541d) bind$alg(r3, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) 23:54:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x6) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x6b40000000000000, 0x200, 0x9, 0x2, 0x0}, &(0x7f0000000080)=0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) sched_setaffinity(r3, 0x0, &(0x7f0000000180)=0x7) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x101, 0x8001, 0x800c, 0xe52, 0x4216, 0x7, 0x1ff, 0xd7, r2}, &(0x7f0000000100)=0x20) 23:54:31 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x8000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e000000040000007003000000000000f001000000000000f8000000f8000000dc020000dc020000dc020000dc020000dc02000004000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000009800f80000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000600000002000000010000000200000003000000040000007b1a0000000875050101000007000000ffffffff4effffff0000008000010000010000000302ff7f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f80000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000007000000ff01000005000000ff070000070000000200000000000300ff070000ff0f0000000000001405000001000000050000000000000008c8aa030000c36df4b600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bc00ec0000000000000000000000000000000000000000000000000024006473637000000000000000000000000000000000000000000000000000006a0100003000434f4e4e4d41524b000000000000000000000000000000000000000000010100010009000000a1aa000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffffe64fd2e3ca81da6bd5732b5023b5fd4b6fd7c84fa7707dc1af8ad3f140fae98a38f6ce0c2c98883ad76a362b92054c62477fdaa6ed4bd379489ce147def58bf33fc30422dc199cac0e9e2f9c5e6658d91abb56d039c9c6b3c1144aab688154ca87c523a9182421b94e0269b24e94859f81e68f25f863fc892ada5343ed6ad3405df14661cfc6913c57fa30e4"], 0x3cc) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 23:54:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(0x0, 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) [ 697.158962] IPVS: length: 28 != 24 [ 697.174423] IPVS: length: 28 != 24 23:54:31 executing program 4: sysinfo(&(0x7f0000000200)=""/15) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000080)={0x9, 0x10, 0x1, 0xffffffffffffff9c}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f0000000100)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x7, 0x1, 0x1, r2}) sendfile(r1, r0, &(0x7f0000000140), 0xfffffffffffffffc) 23:54:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xffffffff7fffffff, 0x1}) 23:54:32 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x200100, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0106434, &(0x7f00000000c0)={0x211b, 0x0, 0x10002, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40086436, &(0x7f0000000100)={r2, 0xfffffffffffff000}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 697.610772] IPVS: length: 28 != 24 [ 697.639118] IPVS: length: 28 != 24 23:54:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) gettid() r1 = request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='syzkaller\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000240)="73797a6b616cff29d8d4916c657200", 0x0, &(0x7f0000000280)=')eth0)#\x00', r1) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:32 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x802) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 23:54:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) 23:54:32 executing program 3: r0 = memfd_create(&(0x7f0000000140)='%securityem1systemsecurityvmnet1-\x00', 0x2) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x400000002) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000300)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x8001, 0x0) [ 697.959886] IPVS: length: 28 != 24 23:54:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 697.992403] IPVS: length: 28 != 24 23:54:32 executing program 2: clock_adjtime(0x2c2f6e601e19c684, &(0x7f0000000000)={0x7, 0xdba, 0x4e, 0x3, 0x7fff, 0x9, 0x9, 0x0, 0xe9e, 0x2000000000003, 0x8, 0x4b4, 0x40, 0xc8f, 0x1, 0xffffffffffff8001, 0x13, 0x3, 0x2f27, 0x2, 0x1, 0x20, 0xfffffffffffffffc, 0x8e8b, 0xfffffffffffffe01, 0x3ff}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:32 executing program 4: r0 = socket$kcm(0xa, 0x7, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) r2 = dup(r0) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000240)={r3, 0x21}) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20080, 0x40) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000140)=0x108008000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r4, 0x2000000000, 0x20000000}, 0xfffffde6) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc00c64b5, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) 23:54:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x3f, 0x10}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={r1, 0x9, 0xffffffff, 0xb4, 0x83, 0x400}, 0x14) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 698.454857] IPVS: length: 28 != 24 [ 698.505168] IPVS: length: 28 != 24 23:54:33 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) signalfd(r0, &(0x7f00000000c0)={0x100000000}, 0x8) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r0, 0xffffffffffffffff, 0x1}, 0x14) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x9) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={r1}) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000040)={@broadcast, @empty, 0x0}, &(0x7f0000000140)=0xc) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000180)={@broadcast, @empty, r3}, 0xc) 23:54:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000100)={'filter\x00', 0x0, 0x4, 0x34, [], 0xa, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/52}, &(0x7f0000000180)=0x50) 23:54:33 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x0, 0x2) r2 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x8, 0x105000) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000340)={r1, r2}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000003c0)={r4, 0x1, 0x6}, 0x10) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) read$eventfd(r5, &(0x7f0000000240), 0x8) [ 698.699328] IPVS: length: 28 != 24 [ 698.757291] IPVS: length: 28 != 24 23:54:33 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80c00, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0x0, 0x3}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$inet_dccp_buf(r0, 0x21, 0xd, &(0x7f0000000100)=""/130, &(0x7f00000001c0)=0x82) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x82, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f00000000c0)={0xfffffffffffffffa, 0x9, 0xfffffffffffffff7}) mq_open(&(0x7f0000000000)='\x00', 0x80, 0x80, &(0x7f0000000040)={0x0, 0x2, 0x2c50, 0x4, 0x100000000, 0x100000001, 0x100, 0x100000001}) 23:54:33 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x101000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0xd}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 699.007945] IPVS: length: 28 != 24 [ 699.039691] IPVS: length: 28 != 24 23:54:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/83, &(0x7f0000000080)=0x53) 23:54:33 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2, 0x40) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x100000000, 0x20, 0xa3, 0x185, 0x8, 0x8, 0x3, {0x0, @in6={{0xa, 0x4e23, 0x8000, @mcast2, 0x2}}, 0x2, 0x1ff, 0xb2c1, 0x3, 0x5}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={r3, 0x330, 0x30}, 0xc) 23:54:33 executing program 3: lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '^\x00'}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x2000008031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:54:34 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2a0002) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x800) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000100)={0x1, r2}) 23:54:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:34 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xc0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0xdaa, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r0, @ANYRES16=r0, @ANYRES32=r1], @ANYBLOB="1f3d3ceb25d17c078140b7705b2fc434acc8772502f56df4af0950efcc2e6a5d1483b6b19627174f5c61a4b7e617e9fcd7834a1e7e4577f5ee3ff4344452bf8c20f84bcef78c1186ef0f1fd121c2e8905f723b630e0c929734491f475dba229358478990138135a21f1bfcb32cf7a62b772765b1795737827007c2c60561bb8207661c801d768d12d9cb9010af52e9916c9645181a893fa8243d17c4524098df93f2e5e0088f21f831cb417951", @ANYRES64=r1]], 0x1f) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:34 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000080)=""/123) 23:54:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/28, &(0x7f0000000000)=0x1c) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000080)=""/15, &(0x7f00000000c0)=0xf) 23:54:34 executing program 5: socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) 23:54:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 699.908560] IPVS: length: 28 != 24 [ 699.934579] IPVS: length: 28 != 24 23:54:34 executing program 2: setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x8}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r2 = dup(r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000280)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000440)={0x0}) r5 = mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x60111, r1, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000540)={0x80, 0x0, &(0x7f0000000480)=[@release={0x40046306, 0x4}, @enter_looper, @transaction_sg={0x40486311, {{0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x30, &(0x7f0000000300)=[@flat={0x736a2a85, 0x101, 0x0, 0x1}, @flat={0x73622a85, 0x10b, r3, 0x4}, @ptr={0x70742a85, 0x1, &(0x7f00000002c0), 0x1, 0x0, 0x14}], &(0x7f0000000400)=[0x38, 0x30, 0x28, 0x20, 0x0, 0x78]}, 0x28}}, @increfs_done={0x40106308, r4, 0x2}, @acquire_done={0x40106309, r5, 0x4}], 0x2f, 0x0, &(0x7f0000000500)="9926f92d4357936e1dae8c0444e33833087587a3a67281ee176ef153e503d1c490eef6e7ee3a520db1de2bb1ecfa54"}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40a080, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x50) 23:54:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xc}, 0x69) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x8002, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000300)=0x2a9, 0x4) r3 = open(&(0x7f0000000080)='./file0\x00', 0x608001, 0x102) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f00000000c0)=""/18) [ 700.058648] IPVS: length: 28 != 24 [ 700.078528] IPVS: length: 28 != 24 23:54:34 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{0x77359400}, {r1, r2/1000+30000}}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000100)) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0x1}) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000080)=0xcdf) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) 23:54:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:34 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') exit(0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffffffffffa94) 23:54:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x10}, @loopback, @multicast2}, 0xc) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x20040, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, 0x6, {0x0, 0x0, 0x1, 0x1}}, 0x20) 23:54:34 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01042abd7000fedbdf250900000008000600018000000c00010008000400090000000800050000080000008b6cc0bf1f29b36bd6fae17e2cd43a3d7ee7015330ed508889ead0637adc8e"], 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) 23:54:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x43, 0x200) 23:54:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x9) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x80000000, {0x2, 0x4e20, @empty}, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e20, @empty}, 0x60, 0xfffffffffffffffa, 0x6bdf0cd6, 0x101, 0x5, &(0x7f0000000040)='yam0\x00', 0x7fffffff, 0x0, 0x1000}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/28, &(0x7f00000003c0)=0x1c) 23:54:35 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x100000000, 0x1) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x50) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuseblk\x00', 0x100090, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@appraise='appraise'}]}}) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000180)={0xbf7, 0x7fffffff, 0x5, 0x0, 0x1c8, 0xbf, 0x6, 0x0, 0x8, 0x4c7, 0x8001, 0x5, 0x0, 0x1, 0x6, 0x1, 0x9, 0x0, 0x2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:35 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xfffffffffffffffc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) getgroups(0x5, &(0x7f0000000180)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee01]) write$FUSE_ENTRY(r0, &(0x7f0000000280)={0x90, 0xfffffffffffffff5, 0x3, {0x5, 0x2, 0xff, 0xfb4, 0xa76, 0x8001, {0x2, 0x4, 0xa, 0x8, 0x8, 0xb20, 0x92e, 0x8, 0x67f8, 0x101, 0xfffffffffffffeff, r2, r3, 0x5, 0x1}}}, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:54:35 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:35 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:35 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:35 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x4300, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000180)={{0xcf59, 0x8001}, 0x3}, 0x10) r1 = socket$kcm(0xa, 0x100000002, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2}, 0x14) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1000, 0x40000) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f00000002c0)=0x401) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={r3}) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f00000001c0)="a548a09facfbffc2d8ced0dbd634e09f7d9404c875b39f1f1510c603c919575480eb4005ff44ac5807d4f92fb1cf62d7da01c187a55218f9fad941326a2297a308fcf23a2901fd48ebbd92ac703f9fa3fbd94daaa1461564bfc280319490d269db0630c390f3bf12d4070066ef3ea8c1cf6d972f12c72a0122ca3fef1a42e624e95837") write$FUSE_POLL(r3, &(0x7f00000000c0)={0x18, 0x0, 0x3}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 23:54:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) bind$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 701.368085] IPVS: length: 28 != 24 [ 701.378737] IPVS: length: 28 != 24 23:54:36 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001180)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001380)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000001480)=0xe8) r7 = getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001900)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001940)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000001a40)=0xe8) r10 = getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001a80)=0x0) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000001b80)=[0xee01, 0x0, 0x0, 0xee01, 0x0]) r14 = getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001bc0)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001cc0)=0xe8) r16 = getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001d00)=0x0) lstat(&(0x7f0000001d40)='.\x00', &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = gettid() getresuid(&(0x7f0000001ec0)=0x0, &(0x7f0000001f00), &(0x7f0000001f40)) getgroups(0x7, &(0x7f0000001f80)=[0xffffffffffffffff, 0xee01, 0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0xee01]) sendmmsg$unix(r1, &(0x7f0000002500)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001140)=[{&(0x7f0000000100)="5ef54775be1f830716d6", 0xa}, {&(0x7f0000000140)="857759619d6a82c72c89e9ec461a3072d8514bca57b90ae2300f77f3ef1407486e6345d3c139bb5aafdbac78cf880f45d68a2560534ba419e159f5104f0f6cb961168da9dce80c90190319898a4b255f6aff549327c11871bf2c3a6f25a4ec151162c558f96f8bdba9cf7a782530fdfac3e0b02a5726dedc19e10bdc7886aa8698cd6e7535955142c977c9e4974482cb694e2648f3fd01f738520105bb73c3d9fdd647ddd5e559d025b57e6d6f7338ae2d37f1b9adcfd5e68d4806d513d2baa21950713b791a16e7c0a426aea05ab0afd54d9c66b24994a6c6ef12f569b67cb5ea8a83a6cb4ae7e56c2b07e348cdfc364cf66a9a8508467ec96574c7ba93e7997758e3982ed351b7f910d9494ba3707d28fdcbf5100ebce62e780758547bb8b5ab3b320af0e0e1598549cbc0d99b476f5ab1aad913aeb8a66f1bc8552c846630014ae53dc91609c556e7aeee63acc28570dfa1c2051dd9ec3442ff12e4f3503d6270559783bef271fa11279c4cea16d903764251e11eaa5167945433fbfd45c701fb8090f87726b8a555f6ddca4be66de35559cef8dbdef1e27673c9a76f1353a6408306e7719105bfad05a125d1838adcc6f09e3155d19ad524f92ac6774731dddf06549087d1976e329a1fcf0eabfbd5847208df81160822eaa624f68b18435c458d3c09ae23e151683528592878fce67f1b5610a65117a9fd1fc7f61dd4fc9d3b34125b5576deaedc2c9ec9dc5e2689929ac9bd172c884be8d6f8a23f4aac07029003574fc3c08aa73d3e2c42dce94166a487152ff077d1d735494640389b71c8368203d263c7af1fa8b98ca52b014b0ca9da843fd528495efd84d8b39348fcca413e2d88e505751d2e462c1565288eae3aad508da12281720516b15332843d484a038a9d795a2c140d24bb0b421c52275cd3db9d9008129b6645ec3705488470fe36b7046bf7f4fcfffd14cdce7e52fbd4abc700e35132fa1c2a4512e795eca11fe90dbc317a69509d1e5ac4720b128d095e7b6f64eb787a0e13a57a9444c843faa79d30c4e080ebce3d6879568291838e81390aa55b33536ef19b1c0176d32d5cf03b6a7676cd276b8f3a2ecb02338ef5e2e2313b0426b5b24071837f7776facd13e4d3feed2d7296765353ef1ffaa368434cecf68ab09c9da6f5a8f8c674c50c70d2fc145da3d8bb7e1642778591dc63bc8a4a512d2d23e7634d743ea35a2ea5d7aed5f6ce3823a749284930bc45c7bf524de96e137e7d7582c1e5cb1163c0b82a8d32e7266c4c33deb2f8c38d36e7225db24244e876f56a39a8223b4466376425eae563e6efc089caf2afbc75282533045390f1a03af30ee3f0640b31efa8925769b971de625a9769155becea0c2ef20108b70e980fbe84981ca08c7306931e02d5a1280a416f57d95f8ce877992212f2827b21a756f3b476ad7ccdfdc2158976f3ca10650939f494c31fa6de3cc3cc8d460d044c9bc65232068160a8e13ae3866ab3c8aa37c1d4814e1c7e54fce903ad95fadc21d7d3968d026b964b6588e071f16fce47f3e6c4f6cf6ea5de458f1b1d172314bd5bc29fb29bea3f14c1c6eebe11012800095ac2b040ab9bc735f5f862eeda5e41b70f1b4a8872f538bed6cb17a110aaf8bbbcbca2c59ecf0c770848cd597ea9b8fea295791eea9334556d6a2530150af3081eaef6dfd42386510f12e865bf0eac44ed45627d85f8b83f6964608c399567bd68393af8558d9adf2955e3e50bdcf351687148bd48e0293356327d9e81123aac1ce340a35fbcde9a6266faa065aa3aa5a7b4441064d56ce89859c9f7ee7316a356f0c8437bfa20f996c05176d61b435f256439a6aab4927f5cacd94a77876e9d38e5acf6788c7336eb995ef5cf9f412446d47afbe3604798f691a1de5adb5c0ca511fe0759ed28cef309197c96cb029a61d86013d1e4780ca17f57878d99e1e4c651d9e066ec73a3b6a8d1ef4c054fb5bb9b3333bf2312c20309dc36edc78bb34d866e9e7892efdb261a1703989b5b955863b14bbd6443d284791aca6ddb4d91b920abbc966f2510b829f57081433817ef82fc6b1d777eb5f6e6c0be5c8e47cfec366dabae423d80ffbbb24afb4c14e533ebfb20c366f15b9854e315cc31493f8446234180d5161155b4e4bfe369882f16568c62dfa32215ff8850df034c99fb2f72a6f4cddafd921c9cac59e98ead0ab239e02d4eace9c88bee2a0be8b57e9df78e7a959294c1c1725db5915810962c21d0014d82ec930655ed6eff1dd9e0b07c1f3307e35bfa6aaae9131d0001324fc01bbe7bd456af3d586afde38dfcd43b8ff59b80baaf213cd82fc6648bda34a836f8585b400fcead863c1285b8f73c10893de950b21420fbc5b09ed6120e9e5e4ada88d935c3f777bb980b87d1df8e415a4f321ff19caad2eda1903dde2b360f306bbc96fcaa30ebff773af698814c92d99fc2a806e5ad73ad59d59b1c9e4556eb37bfe0a0e600144b165dc2f5f408d0a1d5b19aefd0defaa366ad62be852fecd4fe650dd4b42a847b7ae4facad772a6de0d35608665f53227e8ed10eeb091864091f02cec861a67f77c29e5ef504c1644ed3236bbe98c131e6ed335e8db06e60f3f4bc275bbc817f3effc36a392bdb310627460096086f66c4f8ed4a9587f8764c13098dc504393c373e0029016a48840895f3a76f44f46feaae0d4ffd05cf9a0c99b45354c2f7de9b1793debfa776c8de3eed1e8b446b946e432e124f91b83e50439ccb0f9ac168c668ff8b26f1a446f48e2e2c65e92ea81d514a252d47af019bb6204036aa84b5244281ed7bf10fd610a4c23826f4ee794d16787fce837082d0dd382cc19a8b07c8a8fc262a85292dd59d6377290c2272e631af55e508a613352216efe32a26273be301b3d0b16e90d80bbfb7dfac5e3ad70eb663d02ee6129db7953d8041beb18e8a74a9e35807ebdae3d9e6e2a061923a9c7253203357f013f0df69dad4424670283a067311a8b2c3280cb978ccc1dcbd8afdfa02bc2d4099cc453042b75867ebd2e91214353aefa0bb5fe72dae3603070ccc9913e2057c121b6aee760bcdb3428b5c9897d6e53881a5e2edaf60ea2db9e43d14e8227993d8f3070bd7bba9ba7b5e450bb04a998a2180b1c28ab6457ffa0838ffae4bedb602ec4b638769ceb557fb9a19e260f09e6b53b1cb324a6807b19a9b4f80c6746f5b9668d32501dd524a6561f7e39f8c145175d8597ec146e611b60a1d101069c6d66330bfb69087ebf3aebecd5ed92e4b06671120aa805900303fb0e47741b4755c916b7a6aee6c55be86683e88a95c701eb847f398577c844ed83c4e8e38c6bb57c8ede856f3f5230806cbc193bd4d655b2dafcc77ba7e78a15644225961eef8992405580c2104898b0d279b712d2a1e23ffc4bb9f95e9d6e6ccd1d41b2c99440ea38a2848c41dbdc5955bc1add546444f45872977373db4a085e9da48f647d92d4dcd4e9a20d0191d7d5e7640b3637fbb2ef3ad0447126ea35898ea83a8c0e59d3b1e76d6b3e27cae0a314a59f6cff65c0683aaa88bd9a953553b872fa20b0d282fa7069e3a29032f45695ae7078f52ae48a4e41790a64ba56887a199abcddc57ee40e7f4303a1d4f0141310eb4576e55048fa698e548953d4dd3dc04fddaca0136a757cb3f458d52c22d3ce57727c52a1ec9927f4957a96c26f636b1f93c3d5d46e5098e135f352d4b0e56c3a7669c48bb4016e47966db64b76cb0da49c07297621d82f6ade1ba5ba31a24e3c802b70458dbd5046a6bdb88316107ba574fc7c5b92d44fd4e5768515b66b52c13086427d89a6cc8aa66485a47e88c04f5c56a451ebf51fdc98dbddcea8c5cfbf1b91af13a07461b6bfd8da41b7751226df40d3c005f46646caf0e419c6aad1fbe9861a0ed123c151cc6e9797aa3452c6f62e201b6e4f9a6764f1c34affdd36e04da9ca31b0d56677857d2e76c5a517d50ab6845b5448cafb14b1199ea6437fc3325ff6d09b0cb9e39b0342587f0ef7cfc7a5a5a90680700579a9090c767c64d059c361db2f1e9a223470717ee11adf369e6736b82f1fea44cab920ede1ee9c64e1d9da325a053dad4f960eb37581e773d6e4cff797b06a77c556a8a1384cb89f884d6d9b882c8135fae21fa1c978176a83d5f487fc346b360c01a51f07fe9b106d75e800dbcb59c69d2a6408d99e4fde2de603d15b0e160bddd7e5f26098c49426b1097e4db271c7c423f04210ce5bedafa423f069213671ff5889acba6e88e5c7c17fcf0bbfeec4e3395cb236085d9b8f297152b155b0032da8c8ed53c411a72a3a22798e06c30d43aef921e8a36d9a5de07da6069a7774791755045d2ab04e0c06687495258c3c22ffe6a32d4f7e0bd18b32a7b80978f70a65e4e56d24ad63ce2c650de3b1092da00edf5cc5e87785802c455b4c99023cb26664c8138f8b582bc84cc1067099f4a98410a967fb885841a657bf40d949404f248622c7866d2ceabb3417f1013ebf00182b85dff89c964b2861d81004df768dd00e417597cf89e7d577e120232800b0a2c31582731e2ed3424a565173ad8fbaf0fe15ed45d9c648f172b8d3ca55ad7993225bbe6d3c619b50272a577d1c4fe269de22e45f0bdb191fe9b1adb967dc2fb7db9fbd3614fce1441d12a45b93d33b684f131e89ca8e22d2a7faf97de05767b34d477613146efecf8b0d6eade25ce9217ca2e6b863882b0df41e1b6750374d53590d7a7050908edfc66e68fb6c572d0619ad4eff4a6791eb9a04cb7a5b4466a2fc8e19c0eba391ef48d45d7e186d1f6359de39fbc8c42e4b5ef531b21187bae1dc2a6d2b65950fb024a109d16cada6c323b7ede6bebab83876f3ccf9bde444917d0531be5635d28f653a986206b8680a25a10243c9f559ac0491f6aa2713e6fe4ef05b55cd6df11d8ea6010a68f2bad18fa5031fd7ff07ae74a45c8e21fc26c9a47496d5b9b0aa18e909683d411b0322355ba8760dc5ae09ebb057d8b21732010ba79afbca8fb10da6e6e519f073ded5d7e29e58478172ca45f8defe2231fe9f7028b26d68f77426a303080f89be2e4ca5aedf3aa73b20074dd9c0e074a77fd9638d7142a6122c4ffd5d3f51d84f8fd600137c035618520eafd22d56bf4f9189b950b6ac9bda91033e4b597b7d88ed2e8f50522b6715ddb468d6db218c5c1b19844282a69626a5acf16490a9268b9f10e63a541e79719b7724b9c7960e8ead8d6650066bf28f46eadf2ffd44f1c84a2877ea2ade222561389d49eba290a7c74866ea8979c94a229f08502af8e7da7a4bc7627fe7adf9363ddf94179aff1177ca7af7a08c7819a65f6eb47ea6cf7121acec6bfb0401a36cde30db0aa7fd42342fa81554440c58ee0fe2fbb4374f3fe74142813f6a85b16428efc70a0e1aa016a1eb5a55bd861bc3bd20966c8b8ddd21fdb55e6e8b33b0e9e6de76cd5ebc035151a8631c1c9b438b4732a456dd3057105dfb47ed7d1ebf321600ab17a72e08076b75bd4a9000385d6f20532dc12afab8e09dd7d9803abdac38fd37c93ad2e53b3a750563679966e469c2d784be7d757d98bc6afbe52ec23399ca0dcbe0e174dff81d60aaa5ae085162e68cb533ee3b95c63ab55050d3847be0eeaaa95889576a46b691aa1582b415aa0cfbc7040fb00a2026a0e6513ef795809539033c80a2bc5775348de57cbda95adee8668348a5d49a8168de5e4630511d533aae3b8a13039eb21e295139d433d119c93e115f664c59d0aa581d3a6605f2a1d9a6db4b353e36319ed60dd876cef2cff0d27300d572", 0x1000}], 0x2, &(0x7f00000014c0)=[@cred={0x18, 0x1, 0x2, r2, r3, r4}, @rights={0x2c, 0x1, 0x1, [r1, r1, r0, r1, r1, r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r5, r6, r7}, @rights={0x1c, 0x1, 0x1, [r1, r0, r0, r0]}], 0x78, 0x240448c0}, {&(0x7f0000001540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000018c0)=[{&(0x7f00000015c0)="14e275837fc54e16f161eb2b6487b92c482626e17786fa9709bc122b60687d81e81c53602bc98e63a8477c77e3a487e425e229c7", 0x34}, {&(0x7f0000001600)="91ca5307561734cd14a57f7412f5323bea88d3d0ee8d1b314c507f9f03d43c7a89ddfc4b769b0cd01a056bcfb826aeb344592322675c050d43cbd18eb6c5800598b08584060eb4ad87e68ad185789fed9de77af24663ed38ece023f4ffaa6093306d5035cba7bcf9affaedb251aeefcd9c0095e682d15a3072acc0cc47dca39b9d4401c96871f7bca007f3e0a831aec939a3d19cacd52f2239d38adf2c1425508877", 0xa2}, {&(0x7f00000016c0)="6194c2c6096402554a53da440472db4f2d029fd7985fe850765a4b2812abcb612a7212dd0fb18dac38dcbf9d562a63381c70375462d60d703b5f6226ef719ba9d79d84f1f583f90b1cb1fb00fa71567810c92b5505a69ac8dec386f95e8d763eab7d6f94b006c39ea619d0033b6f020fa87a1b59c9d96eafa8bc6df13ad9a6546a6d09dcf5a908f76e1bf30b34f37f008b4519cbe1097b7fc347d5532aab6119fcdd9b4646075231721cf63a26950141b0699296ee6ad2765a1221557c45c122978040729b1bad08024813b159be8a09fe79d5c2ed0b4d189e08bf77f51ecf4d87c4fb0919880b018613d4397451d93f37", 0xf1}, {&(0x7f00000017c0)="727bf4b51bd7f4b7b3d08e2a770d919f5e611393d3da979cbb9f1656ba3484097b19dec27bd1ff2b1f2e54259da4fa2954a1544aa99360e16cc9b89a2e036ff8a317cc998a172ad4b3e83bd63abed736a6b2c9350a6568b26a31e94a8d27d98a37487bfa3dfe9a5140061310e6420cad0dfe0c9718bee8b4a70085d150dd7579f2543734e885256b663c2e0325a9af2f3c3e5ced75f7d25e5226040bdc249a52021c8a7f7e68b2fcc8461edf68", 0xad}, {&(0x7f0000001880)="e8", 0x1}], 0x5, &(0x7f0000001fc0)=[@cred={0x18, 0x1, 0x2, r8, r9, r10}, @cred={0x18, 0x1, 0x2, r11, r12, r13}, @rights={0x18, 0x1, 0x1, [r0, r0, r0]}, @rights={0x1c, 0x1, 0x1, [r0, r0, r1, r1]}, @cred={0x18, 0x1, 0x2, r14, r15, r16}, @cred={0x18, 0x1, 0x2, r17, r18, r19}, @cred={0x18, 0x1, 0x2, r20, r21, r22}], 0xac, 0x80}, {&(0x7f0000002080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002480)=[{&(0x7f0000002100)="dba860158fd5fc28a7317968ad6d1fbe2fa9935fcca882fe4869cf4b090b11e5cfc32c1872c6ed0e758bb517e930903c959491d747118412258416873882d0a29ebc47a5c23afa338d9e378906e42ea5c16b2f9a75e4a93c86bb9ca577c5fd318309eedb4dce2dd9b1ee78c6d21bc0390852867cda170abb5a7f765ef222f3c7af725722958d705a6206071964c376fa6937e877d1894446099671c0631f905337ea7bd6302ff6226f44c27da5f6bc74698d599817f2e038dbd53c0b049e337a0c1e97fc560cd519b3b7f2f7a97fa3", 0xcf}, {&(0x7f0000002200)="63596afbcdfc18974d4361cd1841f3e50caf6e466040f815524552c4180c90b3b35a5d9cf71a8c873a7cd764d1a0ae094c94a4c4ce7fb9fdb58988f4ba385c0381ea4cd751f666a5cbcaa8b48130a471b6416ccbb41916075283f20a91e335ac38a60bc7fd21f6fbb1207e255e93623e43c014856e71881d5774da5e86db7ec2", 0x80}, {&(0x7f0000002280)="dfc579b1f65134514c030d0eca313082aa4f5085d8661a411ee842ee06cbae05be9ea0bdc69c3853ff07daaf86cfbf923d94d364f07c1f883f564204783fe813d1adf39fe0d8f8c70af89c1038cac3a58e4db80d5be38a5b7ba5bca6ccf142b1d96ec7a5faf0473c9e4fa5684e7a06d05bf34d8de44b193ea9b52592bb1809bfa86d920d1ac2f7e49ae9624c9264e15098665aae61064e04677e3ec1c0fdb3998f2f912d3d46f728", 0xa8}, {&(0x7f0000002340)="9f7c582b46e15cf562e0d8082127f9e2a70b01f7562aa4acda14eb95176b170517acf164d9867517447ee86b8ec40ac2432a8b5b4e621a370c79ed4ee4656c4127", 0x41}, {&(0x7f00000023c0)="d18bc96d329e1e2db5499aa907bf3c55c65e3406be5f3a1a45c92d6284ded8e670a4086cab2a5efea1710b32b7a229fed905a998b954246f265203b8051b1e3d75f2cc132c72de8669e43b9d6e415e17d01650b9587a78b4a258e1f5ff4c1d02230e043b91d669dedcf5b0b9073fd240a84ecad473a9015a5059ac28c694a83f11dfb21fb51dc1c262fdd758f7efca541ddb164ecc03433d3b31706497e9ddae972f03d098153326ba5b9553993509356b95de70f01f216a6d94bbb528", 0xbd}], 0x5, &(0x7f00000024c0)=[@rights={0x24, 0x1, 0x1, [r1, r1, r0, r0, r0, r0]}], 0x24, 0x8000}], 0x3, 0x4000000) 23:54:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={0x0, 0xa91, 0x1f, 0x2}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={r1, 0xc99f}, 0x8) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:36 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000040)) [ 702.240944] IPVS: length: 28 != 24 23:54:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:37 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) getuid() 23:54:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 702.422059] IPVS: length: 28 != 24 23:54:37 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7, 0x800) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000240)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, {0x307, @remote}, 0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 'syzkaller0\x00'}) read(r0, &(0x7f0000000140)=""/255, 0xff) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x1, 0x4) 23:54:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'rose0\x00', 0x400}) 23:54:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 702.603619] IPVS: length: 28 != 24 [ 702.662358] IPVS: length: 28 != 24 23:54:37 executing program 5: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x3f) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7d4b, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x20400) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r1, 0x28, &(0x7f0000000300)}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7daf632a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) bind$rds(r2, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) 23:54:37 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)="2f70726f632f7379732fb46e657400000000000000072f6972655fcf6f6c6573745f636f0000e2311d0d0252210663dfb21d4f0adeee8fb120306fb4418552006cc96f8c2985fe3b4721925a410189e893f2160f880e581cb91e682b71fc213a47be20480d6fcc04879b6f104fb7f92cc38ffaa813a6db4dca41e367d6a29366ac6dd93d3c647df7c50e13cc97a40ac75d3151a7f3c475df20c9bebaf42cd926f2fd468d25e80a83e16867ab8723867285d3ee6ad5a81c000000", 0x2, 0x0) mprotect(&(0x7f0000a0f000/0x2000)=nil, 0x2000, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x40000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000280)={0x0, @bt={0x3, 0x20, 0x0, 0x3, 0xff, 0x524, 0xfffffffffffffffa, 0x4, 0x3, 0x7, 0x5, 0x0, 0x7, 0x1972, 0x2, 0x10}}) ioctl$RTC_VL_CLR(r0, 0x7014) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="b400000039f109ea1eb718c8aa3f41c47e59ba7ec2e91b9c6be5255368c100bbb822f53999acf8e7c6e88473d2d5a4525cc214cb135230faab7f16d3206ea292d1f9c0ea991813ff0b3c7507056831133b3ee172090c6d90be47f36dc890df2cfc1eda3b6bbd028c33b2f4925bfcd13da2ef0f18a7b09bca6a8835880a217c3be3aa175c0881b46fc0a0f7555210edf41ae36d1a417a2c7061c1b053bc5dc0784b214611d5b6414c2e5d42b67c6b9f88680f3206fdd2804d5016c530b8693e6116b2a32dd73cd820dfa5f7b559d8c202d94c379b5371c806383c6f0017dba3a48f39d1d9cb027c9524cdb89c9c"], &(0x7f0000000000)=0xbc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r2, 0x4, 0x0, 0x9, 0xc0}, &(0x7f0000000400)=0x18) syz_execute_func(&(0x7f00000001c0)="260fa2263e0f0fdcaec4c22d05b0757a32ed2e260fd979a1c4c2d5ace6c4e1e171d7c60ffc55cec7c476a42d3fc4e2d507c5c4c24d363e") fstat(r1, &(0x7f0000000200)) fcntl$setlease(r1, 0x400, 0x2) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000040)=""/187, &(0x7f0000000100)=0xbb) 23:54:37 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) 23:54:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 703.352845] IPVS: length: 28 != 24 [ 703.371696] IPVS: length: 28 != 24 23:54:38 executing program 4: r0 = socket$kcm(0xa, 0x4000000100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(0x0, &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:38 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000340), 0x80000) sendmsg(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000540)}], 0x1}, 0x40) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="50000000810000006b2efd176ec59044babf5582b296292d228dcc92c0f7ecad2c9f0e62f6ceb6dd56c525bcac9b7bf4a0afade7fe072d030fcd3596176cc6386323e85080a80000000000000000"], 0x20000) r3 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r3, 0xc020660b, &(0x7f0000000040)={0x5, 0x0, 0x6940000}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)='*\x00', 0xffffffffffffffff}, 0x30) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x3, r4}) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000240), 0x8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='statm\x00') ioctl$sock_inet6_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000280)) preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) readv(r1, &(0x7f0000000580)=[{&(0x7f0000000140)=""/55, 0x37}, {&(0x7f0000000400)=""/225, 0xe1}, {&(0x7f00000002c0)=""/71, 0x47}, {&(0x7f0000000600)=""/244, 0xf4}, {&(0x7f0000000700)=""/196, 0xc4}, {&(0x7f0000000800)=""/205, 0xcd}, {&(0x7f0000000500)=""/11, 0xb}, {&(0x7f0000000540)=""/44, 0x2c}], 0x8) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:38 executing program 4: r0 = socket$kcm(0xa, 0x100000008, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 703.697907] IPVS: length: 28 != 24 23:54:38 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f00000000c0)={0xb2b3, 0x7000}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, @in6={0xa, 0x4e20, 0x1ff, @mcast1, 0x4}], 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$KDDELIO(r1, 0x4b35, 0x2) 23:54:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x17c, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x4e21, @multicast1}, {0x1, @dev={[], 0x18}}, 0x20, {0x2, 0x4e23, @local}, 'ip6gre0\x00'}) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) [ 704.057858] IPVS: length: 28 != 24 23:54:38 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) getsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000040), &(0x7f0000000080)=0x4) 23:54:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000880)={0x3, @capture={0x1000, 0x1, {0xffffffff, 0x4}, 0x4, 0x6}}) r4 = getgid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000340)=0x0) getresuid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000640)=0x0) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) sendmsg$unix(r1, &(0x7f0000000840)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000140)="21c3ef18258bb7baac5b50064dbde6b3d479915c5695798f7a16ab4674d1ed835529a253bbc374b6cd50706cc04d8fb8b0f93908b49148b01c1eca543eb3b3fb1f9b0a8734f1ce51e2e527486220d31c3c269df57466bb814912032b796d0b852675cf4164f9b81e58670b0ba0265933a29a8a18c389673decf8e6371ef2a6d31dec34bbd9f850ed57c0dae75ad3939acdff85b3105f7b72f281ad57dbbd54f318c5ac9423dbba4243ab927a6ce68f6a020bdfb3f6f68feb4ae862148e83cda6345a401d487b2bb0069b2c5977416d82cde4aa43290ecbaf6924ace15035cec265c151a09ba6f0", 0xe7}, {&(0x7f0000000240)="08176b276c848cf82b0c350bb40cb0b541ea20fd10d816ec", 0x18}], 0x2, &(0x7f00000007c0)=[@rights={0x14, 0x1, 0x1, [r0, r0]}, @cred={0x18, 0x1, 0x2, r2, r3, r4}, @cred={0x18, 0x1, 0x2, r5, r6, r7}, @rights={0x10, 0x1, 0x1, [r0]}, @cred={0x18, 0x1, 0x2, r8, r9, r10}], 0x6c, 0x20004000}, 0x20000000) r11 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r11, 0x40045731, &(0x7f0000000040)=0x2f05) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:38 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={0x0, @empty, @dev}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000036c0)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000037c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003800)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003900)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000003a00)=0xe8) accept4$packet(r1, &(0x7f0000003f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003fc0)=0x14, 0x80800) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004000)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000004100)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004140)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000004240)=0xe8) getpeername(r0, &(0x7f0000004280)=@hci={0x1f, 0x0}, &(0x7f0000004300)=0x80) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000004500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000004}, 0xc, &(0x7f00000044c0)={&(0x7f0000004340)={0x178, r2, 0x30c, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x4}}, {{0x8, 0x1, r4}, {0x80, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}]}}, {{0x8, 0x1, r11}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}]}}]}, 0x178}}, 0x20000000) r12 = getpid() move_pages(r12, 0x6, &(0x7f0000000080)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x6000)=nil, &(0x7f0000a00000/0x600000)=nil], &(0x7f00000000c0)=[0x3, 0x1000, 0x2], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) 23:54:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 704.220511] IPVS: length: 28 != 24 23:54:39 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', 0x0, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x9, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x100, 0x0) 23:54:39 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080), 0x14) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0xffff) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000000c0)=0x716) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xf, 0x8, 0x81, 0x0, 0x3a, r1, 0xfff}, 0x2c) [ 704.439620] IPVS: length: 28 != 24 [ 704.464675] IPVS: length: 28 != 24 23:54:39 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r0, &(0x7f0000000000)=@random={'security.', '\x00'}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x82000, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x2a, 0x400) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14, 0x80800) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000440)={@mcast1, @mcast2, @remote, 0x5, 0x0, 0x9, 0x500, 0xfffffffffffffffc, 0x80000000, r4}) request_key(&(0x7f0000000500)='cifs.idmap\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000580)='user\x00', r2) r5 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="13b3b227824a133b7951568693", 0xd, 0xfffffffffffffffd) keyctl$search(0xa, r5, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x0}, r6) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x101000, 0x100) ioctl$VIDIOC_G_INPUT(r3, 0x80045626, &(0x7f00000004c0)) [ 704.688846] IPVS: length: 28 != 24 23:54:39 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e05411, &(0x7f00000000c0)=""/169) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:39 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:39 executing program 2: r0 = socket$inet(0x2, 0x1, 0x4000004000963) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f0000000080)=0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x8c) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x101200, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0xb, 0x1, 0x4}) 23:54:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', 0x0, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, r0, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:39 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)="fc290f46b8796f6300000000072f6578706972655f6e6f646573746edb884a000000000000000000", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f00000000c0)={r1, &(0x7f0000000080)=""/47}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r2, &(0x7f0000000300)) 23:54:39 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4, 0x80000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000000c0)={0x6, 0x1c, [0xffffffffffff8000, 0x9, 0x3, 0x1, 0x3, 0x9, 0x400]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RLERROR(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x15) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xc000, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x9) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000040)=0x4, 0x2) 23:54:39 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:39 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3ff, 0x301c80) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0xd, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 705.213816] IPVS: length: 28 != 24 [ 705.228539] IPVS: length: 28 != 24 23:54:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x434200) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) bind$unix(r1, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4}, 0x6e) bind$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000000c0)={0x1, 0x3, 'client1\x00', 0x6, "db58e0cbb8fb8a79", "f595f5b4913dc09b2eac52fad364a18f85fc478bcfd48206857cbde2e8fa71f3", 0xa732, 0x8001}) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000080)={0x200, 0xd7f, 0x8000, 0x8001}) 23:54:40 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000140)=0xfffffffffffff801) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) prlimit64(r2, 0xe, &(0x7f00000000c0)={0xffffffffffffff7b, 0x81}, &(0x7f0000000180)) 23:54:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 705.472568] IPVS: length: 28 != 24 [ 705.484084] IPVS: length: 28 != 24 23:54:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', 0x0, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:40 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x224b6d877187f4e2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80206433, &(0x7f00000000c0)=""/95) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:40 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000040)={0x1, 0xfffffffffffffff8, 0x0, 'queue1\x00'}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 705.642525] Unknown ioctl -1064545483 [ 705.653549] IPVS: length: 28 != 24 [ 705.665666] Unknown ioctl -1064545483 23:54:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="0900db863bd9f710bea65aae98382e7911daecbcae01cb"], &(0x7f00000017c0)=0x6) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000002c0)={0x400, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e24, @multicast1}}}, 0x104) 23:54:40 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000100)="7d039c39e954e3a5ab2c30f058c76fb5ebe522abe602374cae4852ac6fc668bf978d0a3ce578b93fb82f19bdfbaa430f5e6f2298061db933d7db4faf9a171918011fdcca20c3ddfa22f278d27dcbf89f73780c1ff85f10e486a0197d9145a66374b79ea56e2c3011a79f0a3219eee73f29b2d31c8a76c6b1202048a59ae9e44ae810b06cd55d2cd4024458ee0950b43a543557f246a605b572bf37ea8bf8003a6170aaf3071d5984c21e754c47cde889a778cc3f18eae42d05") ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) fstat(r1, &(0x7f0000000200)) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0xb}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r2, 0x5}, 0x8) 23:54:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:40 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000000c0)=0x1000000, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f0000000000)=0x1c) [ 706.042410] IPVS: length: 28 != 24 23:54:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:40 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20000, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x80000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000000c0)={r1, 0x1, 0x20, r2}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x50) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 23:54:40 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) getsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 23:54:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 706.284684] IPVS: length: 28 != 24 [ 706.314126] IPVS: length: 28 != 24 23:54:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:41 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002"], 0x69) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="62740010000040005cce9a52f9c033b8f450756f1ca61391172df4c28e29fbc6f8533cd293aa247b2297e7f40eca027f30639146002a5aec"]) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2ccf, 0x40000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a45352, &(0x7f0000000200)={{0x1, 0x9}, 'port1\x00', 0x8, 0x21c1c, 0x8, 0x80000001, 0x4, 0x7, 0x2, 0x0, 0x1, 0x2}) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x9, 0x91e, 0x8, 0xd8, 0x0, {0x0, @in={{0x2, 0x4e22, @rand_addr=0x3198}}, 0x1, 0x7fffffff, 0x3, 0x9, 0x9035}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r2, 0x5, 0xa55, 0x3, 0x0, 0x10000}, 0x14) [ 706.490917] IPVS: length: 28 != 24 [ 706.510102] IPVS: length: 28 != 24 23:54:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x40000) fremovexattr(r1, &(0x7f0000000240)=@random={'system.', ')eth0)#\x00'}) 23:54:41 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMINPUT(r1, 0xc04c561a, &(0x7f0000000100)={0x0, "8b2674ebf1e7c0bd70d0e60e61c609d802cad762fa97ce33836accb7ea4aad8f", 0x1, 0x1, 0x5, 0xc00000, 0x0, 0x2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@remote, @broadcast}, &(0x7f0000000080)=0x8) 23:54:41 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002"], 0x69) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:41 executing program 2: r0 = socket$inet(0x2, 0x3fffdfffff7ffffe, 0x2000000802) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0xfffffffffffffc6e) 23:54:41 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x20082, 0xa2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001740)={0x0, 0x0}) stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000018c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001900)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) getgroups(0x8, &(0x7f0000001a40)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0x0, 0x0, 0xee00, 0xee01]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001a80)={0x0}, &(0x7f0000001ac0)=0xc) stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() r10 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001bc0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r11 = timerfd_create(0x2, 0x80800) r12 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001cc0)='syz0\x00', 0x200002, 0x0) r13 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001d00)='/proc/self/net/pfkey\x00', 0x2000, 0x0) r14 = syz_open_dev$video(&(0x7f0000001d40)='/dev/video#\x00', 0x200, 0xc000) r15 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001d80)=0xffffffffffffffff, 0x4) r16 = timerfd_create(0xb, 0x80000) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = syz_open_dev$sndpcmc(&(0x7f0000001e00)='/dev/snd/pcmC#D#c\x00', 0x6ab, 0x73d53823a5088df6) r19 = eventfd(0x1000) r20 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001e40)='/proc/self/attr/exec\x00', 0x2, 0x0) r21 = syz_open_dev$swradio(&(0x7f0000001e80)='/dev/swradio#\x00', 0x0, 0x2) r22 = syz_open_procfs$namespace(0x0, &(0x7f0000001ec0)='ns/uts\x00') r23 = open(&(0x7f0000001f00)='./file0\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000020c0)=0x0) fstat(0xffffffffffffffff, &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = getpid() lstat(&(0x7f0000002200)='./file0\x00', &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000022c0)={0x0, 0x0, 0x0}, &(0x7f0000002300)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002340)=0x0) r31 = getuid() getgroups(0x1, &(0x7f0000002380)=[0xffffffffffffffff]) r33 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002400)='/dev/hwrng\x00', 0x8002, 0x0) socketpair$inet6(0xa, 0x80800, 0x6, &(0x7f0000002440)={0xffffffffffffffff}) r35 = syz_open_dev$radio(&(0x7f0000002480)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0445611, &(0x7f00000024c0)={0x80000001, 0xa, 0x4, 0x2400, {0x0, 0x2710}, {0x7, 0x1, 0x9, 0x6, 0x2, 0xffffffffffffff48, "bd9ee999"}, 0x6, 0x7, @fd=0xffffffffffffff9c, 0x4}) r37 = getpgrp(0xffffffffffffffff) r38 = getuid() r39 = getegid() r40 = getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0}) r42 = getgid() r43 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002580)='/dev/autofs\x00', 0x199200, 0x0) r44 = socket$alg(0x26, 0x5, 0x0) r45 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000025c0)='limits\x00') r46 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002600)='cpu.stat\x00', 0x0, 0x0) r47 = syz_open_dev$cec(&(0x7f0000002640)='/dev/cec#\x00', 0x0, 0x2) r48 = socket$nl_xfrm(0x10, 0x3, 0x6) r49 = inotify_init() r50 = openat$null(0xffffffffffffff9c, &(0x7f0000002a40)='/dev/null\x00', 0x203, 0x0) r51 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r52 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000002ac0)='/dev/video0\x00', 0x2, 0x0) r53 = socket$inet_udp(0x2, 0x2, 0x0) r54 = syz_open_dev$media(&(0x7f0000002b00)='/dev/media#\x00', 0x10001, 0x8000) r55 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002b40)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f0000002d40)={0x3, 0x6, 0x10001, 0x80000, 0xffffffffffffffff}) r57 = getpid() r58 = geteuid() r59 = getgid() r60 = openat$dsp(0xffffffffffffff9c, &(0x7f0000003200)='/dev/dsp\x00', 0x200, 0x0) r61 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000003240)='/proc/self/attr/current\x00', 0x2, 0x0) r62 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003440)={&(0x7f0000003280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xf4, 0x2, {"0f10d7b9eb5a13d38d75e66a1a957afb66c8c5a0eb046defc05b22ca607a1851896328cd1bfc4cda81bf48b9e49c83f571f574240372f994c460e586bb17c6468f1c6ffbd67b97fdc761e6775746d3b7cd05cdd638d1f2d1aaa9d8812743a2628fce0c738df50ba50b7258f34f99d0c1a3f82bc901f047a5baa3ddc1f9354abc867d75140a23c4e92046e9459f6a08508ca69cdba726b16819ac6529aa4f0d9dd46d0a5ae149b0d5dc590297c921a95e35b78c855d8b9610869e4141a27d7f0bfa66dd5fa41748e34dd11d441ab25e967128570b2a4a75d41f"}}, {0x0, "6a99b4f14f9c9cb99392d7f2199293f46f8c5f75063f5f41983aa39f"}}, &(0x7f00000033c0)=""/72, 0x112, 0x48, 0x1}, 0x20) r63 = openat$cuse(0xffffffffffffff9c, &(0x7f0000003480)='/dev/cuse\x00', 0x2, 0x0) r64 = syz_open_dev$radio(&(0x7f00000034c0)='/dev/radio#\x00', 0x2, 0x2) r65 = syz_open_dev$video4linux(&(0x7f0000003500)='/dev/v4l-subdev#\x00', 0xff, 0x200) r66 = fanotify_init(0x10, 0x80000) r67 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540)={0x0, 0x0}, &(0x7f0000003580)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000035c0)={0x0, 0x0, 0x0}, &(0x7f0000003600)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003640)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003680)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000003780)=0xe8) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r73 = openat(0xffffffffffffffff, &(0x7f0000003880)='./file0\x00', 0x400, 0x41) r74 = socket$inet_dccp(0x2, 0x6, 0x0) r75 = epoll_create(0x401) r76 = syz_open_dev$mice(&(0x7f00000038c0)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000003900)={0xffffffffffffff9c}) r78 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000003940)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x80000) r79 = syz_open_dev$midi(&(0x7f0000003980)='/dev/midi#\x00', 0x5, 0x0) r80 = socket$inet6_tcp(0xa, 0x1, 0x0) r81 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x1) r82 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000039c0)='/dev/dlm-control\x00', 0x500, 0x0) r83 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000003a00)='/dev/dlm-monitor\x00', 0x4a0002, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003a40)={0xffffffffffffffff}) r85 = syz_open_dev$usb(&(0x7f0000003a80)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) r86 = socket$inet_udp(0x2, 0x2, 0x0) r87 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) sendmmsg$unix(r0, &(0x7f0000004000)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001400)=[{&(0x7f0000000100)="2e8aace69fd04bc70d475ba8f127997d8a13f56c87f8d204688eae879e2e5d261d3d1eb4a6c3b95c189bb58cae45c3f308be9de3932625ef45ceda1212b6f08c3323870ee490303adbe66569af5e528272bbfdb921f0a8bf402e16251c9d60668c1f8d9d305f11cdab1d65fe4225d3c200c0c6772b37ca7c321a79e4d5f08c45152f9f218d5b461a13c1f321ec52df87d2c8bafb81fb6cdbbda154e02539237f521860caddc882c2b71d3a3703c075f26fe298d264ce6668e99dd85e2ecaaec21c05af998891d4eff07566ae8eedf7fdbb6a5af9b4bdb17688c66b47d67cb9a1472e7b2360653957a7f003b30c7746e2487267", 0xf3}, {&(0x7f0000000280)="992a91a2e1a87678e5937388384514b45c0b149798fbf1bdc0d81453fdbdc1281b73d1a02c5ed89de7429d14234cfcd3886790911f3923392fca3a45f2084493c94b00d11cb5a24998b0cd012284be9be5460770415b25ee66b4cabe20dc493db7e51ebcee7520d1071f58c4b83f8d2501ea6b36e6cfa21f3a9950e10233495d900125728d1aea27487fa902f81325738a77ebf982387b62fac92b8de9dfd9bc740315bd0503805c75778ef082edd25c4b1c75d5ba6ce24515eda016f65bedcf4055408316daaa7ccc95ebcef37c5805e7e4f92f433cd3e56954314935c141289b0709df5ca5d840c0148731310c1ad405", 0xf1}, {&(0x7f0000000380)="aab52fe62c2577a55b5025a5bd2761f7a43e0742ce3929ee781dd1b62883b68aa21b09e623d89a90e2bc08322aa952e28022a36989fff0ff382ac3c98b8c8ed9799f86f2522acd2507df2bb0a78b81efaa1a9967f09f8c9a72eeaa9098442f843c689ff3adda30e79c6c5ce014e5fc4fae", 0x71}, {&(0x7f0000000400)="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", 0x1000}], 0x4, 0x0, 0x0, 0x20000011}, {&(0x7f0000001440)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001700)=[{&(0x7f00000014c0)="f39e14ba14ddea65a54377701e844d9f790371d843f869e398f2d106d5ada8421f743692499742560e84047d491ec62401edfe18735adc72ec55e066193f5dc8376f8cf7da0c68c888864ba5d2936e726e70c1aac7", 0x55}, {&(0x7f0000001540)="654b4c428a03ca2fbd7730100f29534e6da85ca316d79c4108137c556ae7946ef8706b54eff126638c09426949018d7b98d1c2338fbb57e19c1932738f969dcc3fd30851c473bb1729bd1f48a40b638f9fb8e2935cdb172897b903d27f5a0994d60efb970e3ae11f7a7dcaf8efa224b7e2817f056fbb3937207310602b5a6befc301da6adad173ca171471a6e72ee973523aedd162d57c8ceda1ce199bb289f35d2c44", 0xa3}, {&(0x7f0000001600)="67a99a6f5fa9911111ad0e9b4cf3019f0e6bd24eb90b3bfb65ecfa7598cf15b9a6fc1c73bbb720eb05fbf0f6a435ddf9364d693cf21a94107b0fdd3ff92bf05f63472dca8d15423dcf0747571b91336ee9ce18b54e7d8d0f6bca5f0f18a8d848845d4e866d5452dd34e50a6898453fcd8227d57268ab019bd90c6fca332eb8cf4ba86f0519078e77fb226af99dfe487106616a26e5998fc12516a91fb5c24e5be0a53d555c79816ec463b8ab29d4a81dc543c3b271d9e662e29793cd85be0f24a49091d8bc06e1a1acb41ef2ac26a8cef3e4bfbcb9d81b40f171b7204115b5cd3cd09224faf83ded1223fcc0ad", 0xed}], 0x3, &(0x7f0000001f40)=[@cred={0x18, 0x1, 0x2, r1, r2, r3}, @cred={0x18, 0x1, 0x2, r4, r5, r6}, @cred={0x18, 0x1, 0x2, r7, r8, r9}, @rights={0x10, 0x1, 0x1, [r10]}, @rights={0x2c, 0x1, 0x1, [r11, r12, r13, r14, r15, r16, r17, r18]}, @rights={0x20, 0x1, 0x1, [r19, r20, r21, r22, r23]}], 0xa4, 0x84}, {&(0x7f0000002000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002080), 0x0, &(0x7f0000002680)=[@cred={0x18, 0x1, 0x2, r24, r25, r26}, @rights={0xc}, @cred={0x18, 0x1, 0x2, r27, r28, r29}, @cred={0x18, 0x1, 0x2, r30, r31, r32}, @rights={0x1c, 0x1, 0x1, [r33, r34, r35, r36]}, @cred={0x18, 0x1, 0x2, r37, r38, r39}, @cred={0x18, 0x1, 0x2, r40, r41, r42}, @rights={0x24, 0x1, 0x1, [r43, r44, r45, r46, r47, r48]}], 0xc4, 0x801}, {&(0x7f0000002780)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002a00)=[{&(0x7f0000002800)="0850b13b0b8f106c602210c43140b4337005630c6f4b907074c05c7564810d8e5adb9a8a51d81f7a7ab481ac75bca35032345753cdd840adf018090c82388a8eadeac70e72022dad5c259b971b6fdf5282168d83be2c6b6e9f4b50b4eeea03e17f6381d0234422d1bf3cedc9c4b8d77adb34349f10c3e250f902b63d1490fc372efbd6e2080fc4d69461f16ba9612fe943d14a782987d112c4fe7ac537475c0094c69241ae4dac5c5a6f80925ff900c9ea2f6920aa0b7eed77ebd3b12fdb4d3fd1b0f87476e3634af880b3", 0xcb}, {&(0x7f0000002900)="1f4564acd400758036d19fb5f6dbd0962199cf9e8d24fe5296dcc82712caccd7e506e7021e5f3b8332d896107f893d24f7c6ba49def35705502f42f7e9a1181914a1d7251f9632030abd08bab7be8c3ffc86a5ab5c7d3406fd91557d1b2cc2f4c8a7667eb76948e615806cf1bd2d2620a088ef07dfc21a8e686990ffd16b8444f68cb5fa93b27f3ea0ca4a3a699af8a79d7e3e8ca60995", 0x97}, {&(0x7f00000029c0)="b60158ab9bb4822e08b70fe09187b3aa7865d1dd9ce7bc489652b3d0f2c775a5cd0b4f1f66490adbc6559598a15bdfeb603399cd1b6f83470cc73014aa9cb911", 0x40}], 0x3, &(0x7f0000002d80)=[@rights={0x2c, 0x1, 0x1, [r49, r50, r51, r52, r53, r54, r55, r56]}], 0x2c}, {&(0x7f0000002dc0)=@file={0x7d8fb2b9f96aa91e, './file0\x00'}, 0x6e, &(0x7f00000031c0)=[{&(0x7f0000002e40)="187918cabb1b5e370d7511ef01f288cd55d1d34f3d4339de17343b37df804a2a78138eefedc8eae8439398b2ec70d0b99e6243660826da340fffdd67359e4290aa00ec5bff9adaaddb0e84a1991554253b11011377bc2ca842dd0aa34260b8b1012d5ff91247994038ef7ceea681a9327465bdd717d157f1d7b8c58d64089bcf083b11fccbb53dfac2065e9a4aef40160a585cf6547f8bee8d19b3a1da95a57542f6a500c1d20844f3f10a81dd932e17722213ecfe2de408022b3d39537c25159299dfaf81538197f7b0a34cf392faba21bfd20eeb7c4b5701c88efead02", 0xde}, {&(0x7f0000002f40)="12b0569729377c49ae43b546c62331666d1bcb21fbe8a101d29536", 0x1b}, {&(0x7f0000002f80)="6aac05e1f9b9bdb332ffd33e23e99a105eafb72e0ea68cb280d1dc149f1400441eaa1df8e51a091b1ee5fe375a961b037d020e240d782bece1affedc76a6437621e8e1592d07203feed5e624fcfe67a14d4db2baa41a8bdad73381b9e01ecd1c52b6918f1c3f39b1f550a95bc10c8b46ce326e1f1c2639683ac927f75cb1c00f119b05648f429c154e7e8db25840e3463c9953767a96c35ddb78009304a3dfb9dd57c15ab5a1f0340d1d96d1c2816c1c5920ba5c77dd5eb9c58c8943be52cf5aa3bc402d620b6576efe3c981d3d1f5d80400f3cd797d9cc305df0377d4619d2eb3cbc75f64aed729e5a721d2005f0074d63a2e", 0xf3}, {&(0x7f0000003080)="03a24d5397ecc6207be94c429b2e331f2dc6e6e36443094bf1b9f8e86a1b8c1921ca2004014da796d3a90a3243de7412a18ce6483c4868f138befc5f8022c223968ade32312453724995f9adfa7ff01bcceeeec6ec296386ada584812e145e481adaae8024d0498c2546bac6667d76c079c3e74c4571bad2a79b71238ae0cc607918c82a8ce03b4256b5bee1c05e0de41121abcd61dae3cd817aae74df6b6cb61cd0244d5bf5e7", 0xa7}, {&(0x7f0000003140)="f03d86af7515707139e9fda22c19f805f5ee58d4d171ce9976ea273913233a1e1e867fb46ebe779ff2b40878e93ffb01cf087a17453462574ea7a956e5db6dc5e14011ef992ebb97850b3d9dc2c3a2b4390c28beb3e33ac6b6ff5ac3ad960576b7cce02ecc90b048953f5d18c95a4e925c6f56", 0x73}], 0x5, &(0x7f0000003ac0)=[@cred={0x18, 0x1, 0x2, r57, r58, r59}, @rights={0x14, 0x1, 0x1, [r60, r61]}, @rights={0x20, 0x1, 0x1, [r62, r63, r64, r65, r66]}, @cred={0x18, 0x1, 0x2, r67, r68, r69}, @cred={0x18, 0x1, 0x2, r70, r71, r72}, @rights={0x10, 0x1, 0x1, [r73]}, @rights={0x20, 0x1, 0x1, [r74, r75, r76, r77, r78]}, @rights={0x24, 0x1, 0x1, [r79, r80, r81, r82, r83, r84]}, @rights={0x18, 0x1, 0x1, [r85, r86, r87]}], 0xe8, 0x24040805}, {&(0x7f0000003bc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003fc0)=[{&(0x7f0000003c40)="2f6da06c96322336e55f2e0623e7c484439555796050131fc25ce8037bfc73f29becdfc16705c8d743cfdca9a8eef9290fa16f1a5971bc8a1a5be5bd1d07180c033566c65323369e6bc9eda534e73f1556cfee3ce8a74977ede1ed11168015e09d6ed9471e5187b9724851db42254b1295a0", 0x72}, {&(0x7f0000003cc0)="c58b9c45725d3b589cf5d0b219c72fdb358bb56220502420b3505c79d9726f0cf6efdec1ec53df9a7c28a375b6764d878e4f89b468b582577a7089c59092eaffb6de10ae2d913e737f24ebeac4908464f9ecd9e24273f226af79f5cc84ab87885d8bb2013f3d343256d643c117ac73385967d40ec437a6be02f3c48042f286b0766ca4b456fbe9e2b04917", 0x8b}, {&(0x7f0000003d80)="d19e9cb760b08164824b1e1418b74920ff03085b7b4210aaa4da436ae0efdc4a47c8fcedcdb25434da1d0d906861274c55c7a664096f7d737b426e3675d9ee0ab474eb9a258abc75295dcd89f0a6f915cd095b3d061c2956960c9f617b1c3cd3cff97f3c455cbc93d8636a847b4f59884c48daf776fb612f6e2c1ef4b3f1222e2a53c415f5230a02b67d29a9bfa67093dc55a2e76948f480abee4f9e06b53ac5b2f0be43e5c76513139858503502a4833e7119327cde42d1590f2155", 0xbc}, {&(0x7f0000003e40)="26e68026d74dfbf1f269d25eac829b535a37f3ab6036af6f665fe19cb0fb2168d9d47198483f34ee0810b2fd4a66756c3baaf5b49941948675a6a5efd334be9a80046c955b9946aa24c06af0d91472dd562f3f026befb0dfbef3b556a5f9593681f1e4192ff291c5dae7ceb8dbd73d5577ce4192b1cfbaa83e5974dff609383e788d0ae0d55d79c34f9d2718d142b52a80ad04f73c7773c523466d583fb95e4765ac002d9122654b2f7a7ed023a41171b533200d9fffa244c00fd4d75c1f682f1af05110b23a46d70bd85d26480454603d879b0f4e305009c720be9635ac", 0xde}, {&(0x7f0000003f40)="e6ff8c405232369ab4922e64f4d6a476ad59393531c6b5762993ae39eea3dceca190f8d2a4c4301d137f5b33ebccf17bb1ab0cc31cbf59", 0x37}, {&(0x7f0000003f80)="c82e5f9c63", 0x5}], 0x6, 0x0, 0x0, 0x4000}], 0x6, 0x80) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r88 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r88, &(0x7f0000000200)) 23:54:41 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002"], 0x69) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:41 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x200) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x2}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={r2, 0x2}, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x6b, 0x25847708, 0x4f2f22ec, 0xfffffffffffff18a, 0x5, 0x84a3, 0x1, {0x0, @in6={{0xa, 0x4e22, 0x0, @loopback, 0xfffffffffffff001}}, 0x8, 0xb272, 0x400, 0x1000, 0x10000}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000180)={r4, 0x5}, &(0x7f00000001c0)=0x8) 23:54:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) write$evdev(r0, &(0x7f00000000c0)=[{{r1, r2/1000+10000}, 0x17, 0x0, 0x3}, {{0x0, 0x7530}, 0x1f, 0x2, 0x5}], 0x20) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'\x00', {0x2, 0x4e23, @multicast1}}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/28, &(0x7f0000000040)=0xa) 23:54:41 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff0000000000002000020000000002000000000000000000000000000000000000000000000004000000000000000000000000000003000000000000000000000000000000020000000800000000"], 0x71) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:42 executing program 2: r0 = socket$inet(0x2, 0x3ffffffffffffffe, 0xffffffff80000004) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:42 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000"], 0x75) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000120a43ba5d806055b6fdd80b40000000060001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x10) getsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000340), &(0x7f0000000380)=0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) getsockname$inet(r0, &(0x7f0000000240)={0x2, 0x0, @local}, &(0x7f00000002c0)=0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:42 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000000c0)=0x5) 23:54:42 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000"], 0x75) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x6}, 0x33b) 23:54:42 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x1001000008037, r1, 0x200) fstat(r1, &(0x7f0000000200)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x3d, 0x9, 0x80, 0xfffffffffffffffa, 0x7, 0x3, 0x20000000000, 0x2, 0x0, 0x100, 0x9, 0x10001}) 23:54:42 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000"], 0x75) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:42 executing program 4: r0 = socket$kcm(0xa, 0x1808000000000e, 0x0) pipe2(&(0x7f0000000100), 0x80800) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x20000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) [ 707.808727] IPVS: length: 28 != 24 [ 707.814001] IPVS: length: 28 != 24 23:54:42 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000724000/0x1000)=nil, 0x1000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:54:42 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff0000000000002000020000000002000000000000000000000000000000000000000000000004000000000000000000000000000003000000000000000000000000000000020000000800000000000000000000"], 0x77) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 707.935840] netlink: 12 bytes leftover after parsing attributes in process `syz-executor0'. 23:54:42 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={{{@in=@remote, @in=@empty}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r3, 0x7ed6) creat(&(0x7f0000000340)='./file0\x00', 0x40) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000280)={0x6, 0x10001, 0x80000000, 0x5, 0x7f, 0x1}) r4 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x2ff6, 0x40041) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000200)={0xd21, 0x0, 0x3, 0xbc, 0xfbc6, 0x6, 0x4794, 0x1, 0x80, 0x54, 0x8, 0x8}) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:42 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) 23:54:42 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)="2f4f726f632f7379732f6e657400000000000000071c643fbe47b484e296b61922b8ba532f657a706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x0, 0x1, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f00000000c0)=""/219) fstat(r1, &(0x7f00000007c0)) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000200)={r0, r0}) [ 708.289703] IPVS: length: 28 != 24 [ 708.724808] netlink: 12 bytes leftover after parsing attributes in process `syz-executor0'. 23:54:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) socket$inet_udp(0x2, 0x2, 0x0) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390", 0x3, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:43 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:54:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000)=0x9, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:43 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x1, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000140)={0x43, 0x10000}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) socketpair(0x2, 0x807, 0xff, &(0x7f0000000080)={0xffffffffffffffff}) write$cgroup_type(r2, &(0x7f00000000c0)='threaded\x00', 0x9) 23:54:43 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x12) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) [ 708.807063] IPVS: length: 28 != 24 [ 708.823029] IPVS: length: 28 != 24 23:54:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x218000, 0x2) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x100000000, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:43 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 23:54:43 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r1, 0x5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 709.008057] IPVS: length: 28 != 24 23:54:43 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) [ 709.034056] IPVS: length: 28 != 24 23:54:43 executing program 2: r0 = socket$inet(0x2, 0x1, 0xff) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f0000002840)=0x1c) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000003c0)=0x3, 0x4) sendmsg(r0, &(0x7f0000002800)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x2, 0x3, {0xa, 0x4e22, 0xffffffffffffffff, @remote, 0xfff}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000080)="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", 0xfa}, {&(0x7f0000000180)="ee77b5a1b536dbdaa5665f540bdba1db522dd254d79e236e79ffb02900c8fde05c173cc6e955ec2f667ab8ec0b4ab35c834480e404f3d687c1b0c302b2d6d9d991cdb6a3f1a82b5cf47f6af793dfb6a314920f22c1144f7ad3a5ec21543eff0ba01962eb0d3e394b8ebcc66c7398694fb9febfe2a6967bb7dfef7d3f28259d3497c6132d5c40ae68820f82f58029d293ddc2d79f24f954020be1e889ed7751cbba753ff87c3c24f837cb8822c22816539b4c570e65", 0xb5}, {&(0x7f0000000240)="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", 0xfe}, {&(0x7f0000000400)="caec67d8a16546b75211eaa0c801c5c1860d06f76e78188c0be616c6faa9709f0fc86396214b8f95850e1f06fe304f59597ff1b5b88b432b47dfa6be838352302690c521739061ec078d1a2f843a34f08496db6ea42b", 0x56}, {&(0x7f0000000480)="007908aba6f715b8eac791be169e67cbe27e05463cdb9440618308726af5625df59b36c3eba5ee8e04bdf4507251943c8784d5e1770a8a909222ce10c79736c10dfe1cfc4d62254ab254d58b5eb1780ba5892c7c46", 0x55}, {&(0x7f0000000500)="5bfe8206ad9255b163455a0f49c079c19247b70bd9cb25a93cdc7f1e134ddf87f869f4ef857cb0ecc3259597a96a48fd2cdc67b39fcee8cd1d1caa0dfed50094250f60edb41f9c90c9d0084e46568559a3dff77148d3aef6647e0e2f9d33f01c36600041f01e447635b8811c80e1b53ec6362c95a30fdfa038425674632b7f2204498d69b428516d2533195a003b3141e36c68078446b86b405ce2e37cba1db848", 0xa1}, {&(0x7f0000000340)="c62cad4316f3e223829d79f6c0d5543da93f5df8377df443cbfacc8ba13354a740dbab3b2066e7afdd472d627b240af045ae322b8b5466", 0x37}, {&(0x7f00000005c0)="b794ad256c8d3cbae347c8685feed9537fa6739c17ba00e5c33adfd761cf4a6b1955340f1af1e05e26a7b5e4ddef176f3de894b2313176c39b731419cf58e2aaa189b3", 0x43}], 0x8, &(0x7f0000000680)=[{0x100c, 0x107, 0x0, "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"}, {0x84, 0x3a, 0x16ea, "d465133acc2a8302f9d361bf892d9b821b3541fc122d7adfbe636254ffe3e48720404a589fd9bf67e77cfe676974e1a452d049b25cd7e5eb75fc42e89f56874d94503eed1d3f1e3b29778c408a9bb6d04635def1a07e12c032a18cf4d1f4c46e927eba318f170dab2e94a5d4dcf5ced771dad80bf7cf9b"}, {0xa4, 0x1, 0xff, "bf39cb65b3bbdfa9c1eebcf604987bd88d36c9af4ad88fadf351537c94020f201532fbb9434e00757961368e699c5778cc3a1bf50283e78c3e6e9089761c0ea75dd52a2a92972885c822bac159b287c860efcd7db334cdd23c9438c66add9da3479900e875a996173408a451a39a5d8248aebb511ed283a6a8ccd74655e7cbd6bd3a20d8227e07543b7646329add80acda94888f65133ccc"}, {0x100c, 0x10f, 0x7733b7d5, "0465c709d0ae134bbbd09f8fd52a4002852f4fb18bd9d9ca02ba799294c76fd9ad260397558fd08f1009bffcb30882006e2bdcca13e60649e6b58742b2fec9bb39b336ed98fb7e2802c51e8d39f1402892b3c68e7edecedf18aaca2ccc6849f7ed26384047e4759d897aa6316e95217b0514802f178f98773c93f91b04b76d5a2e1687e8fec594763800764adba42dbed99de42299ec21af2a58644eb2beef707a3835362f3d1f553e270a9a2cd88e4b5852adf287ca29e29d619443068917eb6b42b579f751b8845485873694c0d68748c2ed57a83feb7ceaa7711d5b7e2517e960ad571fc55383fb57fbaac95f4d27826dae31dddc67c354c45cbf6a6073617914159c49340aa3c6a419ff5879ae1bb76cef63fe4dab2f3b2bf021ed7c8e666cff872ef1dfad016dea247ca1213dffca7c31376ccc6335a34bd6e97fb60156612db4096596023b8ae2c8b4bd92bd2c1d8db21ad2201cbe735a65f74ca0d8bd27fa1d3a7023309e28ca06a211b7de4639d5c68fc79579c6db7798e64fa9be9907469f1ce5e7d5ce552e33782ec5ea0fe622e77cad6c58123169908d5886d3c263ae7ad9f0715dfc87365033ea891a90410a4229ff5235b81578f36f4de7b8370c470ea3f620460170d32b448ddf18c4dfbd95310dfa61d89a8681417ae2c04b00aaf87bc14497644824c3661fdf66b25657f037ce3bd4fbe0d182263d6187d3efa427708a90632f244391d9739f2e459e0e4cdc0726d2aeeb5fa501750110c550bf10410698aa2d77e9e64140bfff350e39d6cd83d9ab83bfa70afc9f1f29923b41c363d1494d0f0f38d3654f93f2ce79fc9a9428cf748cfa1f0b2f1db4d5c192e59683c8e56cd88f12ea3a228da25eec76aba81349ee3358a25c9b6981908b6c3d6d1b1e982489cf9b734beed2a92dc4e410b302ec31bc83dc71e677f78023c21d1080782b955ad74ff7c97e99af6675293cf8b7be5075a652621d9c338108b6794b890d74efbf33bba961056f63bd4c8d7625338f9882956aef30fbfb3a47db67a594f7a17099d910d15ce6a8a09ae8e4cc9267e2f3c1bdad7375250f4fe0ea8c8e2074ee911323ea6caefecbace0259c97af3ab3730191b98698638a8b99885387442dbfab2634739639c14b8858883e17b981f11594d5e90742c065d6e996bc90f693d75ca7dbba52d35bec47abffea72a13f380da2d46bf73ec6c2f46ce28f99e3c833733b31131f63a9cbcf8c2e824894d07414a7037f33d7b6b1f30f5d73a49d88c04a5b1d7c1ffebda7815b089e74d9e881cdc7d5a685f302f0280b5a79ed76490427bc9e4b912e7834249eb07437e2a094ea08b53c47446a5756d7609263ac1be85c7940adf474d47a79bbde7c09121f873bcb36cba1f80bc4086b03eca95c0d095dedb1c9e31df5e50a2069c3e3530150b4a103699d2ae2b96a034863bebc03c5df7bf70de05dff409f91eb2db58d72aaa6a68b165aba96b603b82734408dd081b5e4d4bcfd14787b4f6a571e85953e8f9845adb5b5111b8296890280b9d8fe18555eb9984f262126182d4087f45f3268d33c785de08f34e3c0364f275afd32a36831e565456bdef408927a2f6ba00a9be15f9bd7159465b991204b3ec34e2d7aa28c91eac17397b6e702483441287733440a022779be1ee639bd9dcc0145233591dd00a80cd486f5bea207f50d1645bd9122dbaa7baee24df6b68347f700c70c6c791b9f776ad20cb5434e0c3b77f6091bb51c9d495df56505e6f84b9727aa43110b66a9178fcab4f1cd4f139fab483ec5e1ca22af5a147509cd3e7a435b7e96aa8bf1fb331bc3921fe02c855b767a543a86ce592a7d918148560a36b7c3026269d96234775f2af97450469d5a731d68044b4ec4edf90fb2c22bd1fcb37d37af2972557f119bb9bc1c7f6ecf1321bbf2da120b2c0e7536710702b9cea7694dc37bf627e50bdf5be1c3e6d3e6d694b1a5a4f9ea6cfea8f6698e91e602739960b5c115d23210d7e0ed12195e62f84440420e7875982c81d96e9f7dbed92ad500d3da1fc455fbd5ab659138a70f6d417e30d86649f8e7d2977b61a031a1d9d649b9f9c236fb0d2479b2d92438cbdcc775dcb470f94f772d1cc51c13b6f3a9c338416538323b9b060577c10d846c247fa9780be6b1ec9d197ff3c04b463d89e8b070fa632c5b50288e3813b942755ce4f0689f5fc8393f9d7319697f729032775fd7cd7b33c2cefff70a3c26d31448d64a3d2e9fa4032d82233365773ceffa677c7b56b51431e1e2df19d32ceeb54fb4cdeb502cdbf3a9f45424c065e32d8b16e69a6ed220ec8a0eb5d602f2306e5c1a13f36a070d81a0a1955f9aea1a1474a716678a79b6e780772446d3e5af6b97b228f9fb6fca87432c597677159a183bf65d96a0c810c5bf4da8f19be004b2385d3dd410537da5e430b86b9be05f010da0e4e661bdcc8e63c5c7a00edccf9c42e4712a1894994b8f72de0bd22563fc1a09421768455abac30ee403c76548f81b20f67d4b6860acf9b9ec3e345eda85b247b53b550b8ebdc1240e3d95c8415453cfa64192d50ea70a337684ef9701397624f05ce2bbff3fa411aa295cb78cad0828817a8de9187d20c365fdf135716b3bf31a5b489549bc93f8371400b48bdc9b42a5425c20d7c48cf558e8e611a63211ce4b777642270e0f6c877404eceb3ea4066a21213c2b4b691b8ffe2c0c28e8315e7d7dcdcc3b85e0ca9b0ab0e088748792101ab2d83da4e18f29e671a5e262e8ce61516b50eedc23fde976f6e5e4ad3af6e937a9acf41f3af5beaff454aeab1b8620b9cb3738888440117c516fc73696be4688e04b2aca36592e5531f4de4335a2993340ebc6aa236f60f02531885b405b4c518fdede863b9d7c8380863f72cd1cf4d09d10bd5b81a41e7d76db6e47c630788ea19e037690589f70dec7691a2a9c899f04c8d11bcc83e550a82762dd01eb01a5cddb0a766dc0d7c63c13aa35704069e7b2c024b383253a260b75a196ebe56c2541fa81e7d512ebf76047f115c44bb29fa6887c28ec1a2e6ca2288703160137ebd73f7c67ac8286f0f4777d1db603de379c54fef94b6126cb24002171be7c9cab1d72d0690704fd0082edcf82dc040d66cfc60a1e86c1a9fc13605a3116b5b9b27e474397d17721a9dcd9136fc420915709ca997e2defcbc0a125c30bc62f798bc0d8b9d92a1aa0ac666c833cddac25d0019733aa415a9f023be05f75f55e9c95a20b730ad77ce6d805bf4ac3529ef2ed19a0a39ed3e48f1864843978d00bf005241ab5a28b3910ba5ed6dd7be8ab17d94c6d2c663b57f8ad4cae63abfe9cc7a2349e14608eaa8fb8750c237de744036aeb2795ce8551c49f2c840bc65667beb54f126c1d6c6f636f84e5fb54dea120c130d0b7420be45081c0a19b44e46b8d4475b430865b639f1d03a362fd27075e19a6d77f217856abe2a880258645387d6b21b4d21fbdb05e1701966b5c65d8d8e440672e63613f18feb50dc96bc581466986a78a9614dfa9900eb9926b00622d30f4a656520458ec2696c718b7762e42b2933516039abcedf8cdca0df56944ad4758fc5d99a4c624508cefe10bcfeec6d7a93e3b153a6b4110a81d42484456b007e691e79607c0f3ddbde96d84b93bd69b9a0ec0de939293846c123055fef1c4bb3d5da339e29db56129250c73392e33f725763863bf6aad29a22bf2994e98cf078dfb4937d0ef9ab4e9fd6764d833959248c9aed16b02d544256bf7d9e34b385bc50c6eedc28aedda4bf22dc284562fc2603447489aab552f4829bbc6e16e0b920d46cffc0a40b34845668164e929ac2bf5b14eece24f1de8f653b695c7af1f302b45685545f8d66a8ca32d5642d1fe1adec24e03764d377846a6238eb67721ecf203cf77b1434b4cb995bda96d374d0570710d02d58a49e19d13e4cfba5466df07922f6164c08812f8ee3bcc7105efcbb92865659da1c7a63d5c72bd10dc54969db35dc2d6e3675570034f59fdfe082e4e2929b90e2969cfb7d05932a54a92e066338dedce5f5235a9301ef784787c8493f636ce5483491ccdad62ea205ffe348f58217abe5f6de90a01a1e7f7ea2d7212010521b4b6c79f7434c1ba03ca21ae33ec6782b5fb1a39c95fe3c7e4d3505c757aaef927d2454bb0286e156d9c2f7b308d9a82a09359a2deabd5ba62a8103f3121a75ea799f8295468e368a8ec9397528b7fd33ea6ee496c021a0dfd85646e439863d4c5a9675b4f87f70bf763922eea96045ae8c7cef71ae1eb08f944bc97a023892ada50604ff01c93e5b0cb50f3dcef928658806df161c29a2a0837c08893d9b1ed11c3d789a9644ba0a54aea3032e78cc7a4b6a07cb407c8373f5746db3d284a71a17f73750f036f4fbb2b2ffdd5a57c2d11fb4fff97cf88d061e7fc26167c3627aabc5720ffb725873b32bfd481f18fda9478d3d60caeb831d8e736a773cb6e5be5007015064d4ae53ea7f21303fa970de1a7938589e2b87af5d966bbbdf3cafb14497f874cfab4e1b8a98f8db918b49197dd336e71bd9ca843a09455f268f15aed4ebdfbcdd045235331af9d3b7a59774e414ee227bccdbc9b3e7fdb61005cebd613eb14b564dbfd5835e0297bb185255fb283b24d7c4a7c622726f36331df9f053df61721d6a8cc7604d6cadd701f946b8e99a5b571807d0e5df645a52adc74d676686345185861da2768eccdfc2ff7e5e82d642cd6ba8d71a364c9f281eb0214dc2fe623d7957eae614338de0c9ffcb4eccc2d0bccacdc8609309f6ee3a751b85adced137c9f4224c8c603b846dd9ae733ce500f3a83978d2bfd78fde6562d7c5c1f11337e6cc80e2d7dd45bd08d443e4d55e11855a747e447d6403d2db3a5364b774b56e3145dc588baccee4ae0985b677e29b76af23859352d2383efe70815e1fa011bd4a8bc0742d523ae13e2afb95b37c7fc6eb73c0d80a3c29e409b0d2e15e1c216e876d087bcecb2c8c98212e6f04cb573982bc0d1a89156a42aabadf8a4fe34dbbc92b71891a25680fdb47f325edfd4c3f6900a74864407eb85cfc62e63b8ed0e99d92969a1f449d024fe1a1ac5bfd5665f2555e63e96ab8431d1f4a04d437cec24e2b2f104d24e5ff6dcd3c9e2d349c80ee08ec36bf8e45c6837794c153cbc499eb15da7d7fc0d8e016900d2254c3db0aea6a77ae5505adc6a33ef5ebfbc78b45adb28e1775b305f89adfbe31dd9d318fbb5ab1f5408bbfca5422ec4b2c364e488a562731344ace6ba5ac4a1864b0e1adeb37544c1aed04824718b55b3877de0ddf12d6b190aae1413ca7c81e8b706b0d40580a43ee948ee1c6ec8af2a703d144754f5e4ff94a7bd364e7db4c29b6ba4cf636caaed78a9a592c5975b667898af277ae46960364a6e59bc428b2c136ff17764d557ace794be7158a2ceef5aada40819e33b24247f8244fc1d087c46dfa9dc567567e97d554a2d10d42d06d97439425c7d8bc668115d0a5731a7230091f936a044da17f735803e96e211c0f9f41f70db56939935d6557bfca208e5bbf12eca1bc0ba9e1ca1376b753f763b899156090f80cfe2d11e560b6119d88b23e94e6fe84ccc45404eb14b8cc2d71204fcabad7a640c638de7c89ba1f71b90dfce3191642b6ca3b2b38f8d0c131f7d745f8aba21d83d0bc5661626bf59be230396b763747f59689107956a4146d8a0faeb841c9d13ad221345197c60ad15050b8993bb8e383cba40d2d470dc84c82c0df14eb82c28f564ba66f4862b20fed98f3003a160d4199783ba3a5662d123852d2f4399"}, {0x30, 0x10a, 0x9, "12fd05b7571b5c442764dfe7c3c01d522a33ea3e5dc820acdd32549b451fcc3ff7"}], 0x2170, 0x44040}, 0x1) 23:54:43 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x4) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x2710}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = getpid() fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={r1, r2, r3}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r4, 0x81785501, &(0x7f0000000180)=""/183) 23:54:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390", 0x3, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:44 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mknod$loop(&(0x7f0000000180)='./file0/file1\x00', 0x2000, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 23:54:44 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x13}, 0x7365239350e1093c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f00000000c0)={r0}) 23:54:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000002001, 0x2000) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140)=""/28, &(0x7f0000000100)=0xffffffffffffff58) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_bond\x00', 0x10) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@loopback, @local}, 0x347) 23:54:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000002c0)=0xda9, 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000240)=0xfffffffffffff0ab, 0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:44 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f00001a9000/0x1000)=nil, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:54:44 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 23:54:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'eql\x00', 0x4}) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:44 executing program 2: getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 709.883829] IPVS: length: 28 != 24 23:54:44 executing program 2: socket$inet(0x2, 0x80002, 0xdffffffffefffffd) 23:54:44 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e24, @remote}, 0x10) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000226bd7000fbdbdf250300000008000400030000000d00040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 23:54:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x7f) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) signalfd(r0, &(0x7f0000000000)={0x5}, 0x8) 23:54:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce", 0x4, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:45 executing program 4: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000000c0)={0x7ff, 0x7f, [], {0x0, @reserved}}) socketpair(0xa, 0x805, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4, 0x30, 0x7, 0x7f}, &(0x7f0000000340)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000380)={r2, 0xbdc, 0xfffffffffffffffc}, &(0x7f00000003c0)=0x8) r3 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x6dd, 0x400000) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xfffffffffffff0d2) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000001c0)={r3, r3}) r4 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffd12) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890b, &(0x7f0000000000)) write$P9_RREAD(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="93000000750100880000004ac3beb4bcd8a91a88ba6d91eb253705d0fa2ba8b62b6a4a5f9e098f09222a719b3532e9eb970e23e00dd62e180ccdb1b2d11da4dd568f15a13773e605ab8ce7ad2566c30fc197a72e60c2ddcc6ad0bebaaf80bb056312505bab3e300948a6337a1a53fb59e6c8d92e8a6bc5042cdfb399800b2d9aededb90bb96e8b5fedcc149bffd81006898012"], 0x93) 23:54:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x440000, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x500, 0x0) dup2(r0, r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000093000/0x3000)=nil, 0x3000, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r2, &(0x7f0000000200)) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x1ff) 23:54:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002040)='/dev/dlm-control\x00', 0x40000, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) fstat(r1, &(0x7f00000020c0)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000002140)) sendmsg$nl_netfilter(r3, &(0x7f0000002680)={&(0x7f0000002080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002640)={&(0x7f0000000980)=ANY=[@ANYBLOB="ac0000000d03080026bd7000ffdbdf250d0001025bf2750b56e74d785d228f5c45d7947d77bfa076ebe2deba7ba6ee14bb3440c1f114df2d2afc4395e61460a9a50dbed558b2af5d83af3cb69231a6a3092a3c188ef1c3638de00f03956a62775bf8c6474bcfaf0991e71983b2c8c28fa545f3a97d0d194659b85e7bb4c05a6debda5631141b846e322167fe656aaa6399af5991506e02ef3e4176f8ce533b4ba0659bc4ad7c3e675eff0000f03df61517d9f3eb6a555b6d33417f916ab9aeb66661237d0c86b7d2ccff367c2241b083b579e66aefbfdae527ef2d918289411a54c09ebd"], 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x4000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000100)={{{@in=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) futex(&(0x7f0000000080)=0x2, 0xf, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)=0x2, 0x0) flistxattr(r3, &(0x7f0000000400)=""/168, 0xa8) epoll_wait(r4, &(0x7f00000000c0)=[{}, {}], 0x2, 0x8) unshare(0x40000000) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x20000002e0402, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f00000002c0)={0x0, 0x1ec4, 0xffe, &(0x7f0000000040)}) setsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000300), 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000580)=""/177) sendto$inet6(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x17d}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 23:54:45 executing program 5: syz_open_dev$usb(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:54:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000280)={0x1, 0x0, [{0x3ff}]}) 23:54:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f00000000c0)=0x4) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/28, &(0x7f0000000080)=0xc) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000140)=""/138) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc004240a, &(0x7f0000000200)={0x1, 0x0, [0x0]}) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) [ 710.775155] *** Guest State *** [ 710.802614] CR0: actual=0x0000000000050032, shadow=0x0000000000050012, gh_mask=fffffffffffffff7 [ 710.818063] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 710.846935] CR3 = 0x0000000000000000 23:54:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8401, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f00000000c0)={0xf07, 0x0, 0x5, 'queue1\x00', 0x7}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000040)={{0x4, @addr=0x800}, 0x8, 0x400}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 710.870311] RSP = 0x0000000000000000 RIP = 0x0000000000008000 [ 710.908532] RFLAGS=0x00000002 DR7 = 0x0000000000000400 23:54:45 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000b80)="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", 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000000c0)) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r2 = getpgid(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000002c0)={0x3, 0x10, 0x1, r1}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, [], [{0x0, 0x8, 0x4, 0x101, 0x0, 0x9}, {0x1, 0xea60, 0x1f, 0x1}], [[], []]}) [ 710.942639] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 711.005585] CS: sel=0x3000, attr=0x08093, limit=0xffffffff, base=0x0000000000030000 [ 711.015700] Unknown ioctl 1077433935 [ 711.048759] DS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 711.056885] IPVS: length: 28 != 24 [ 711.060881] SS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 711.103525] ES: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 711.117258] Unknown ioctl 1077433935 [ 711.137896] FS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 23:54:45 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c344ee9dc01497f542f542b0796e0266420fe2e33edb11aa6114f241d1e7d3196f") ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) [ 711.146205] GS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 711.170122] GDTR: limit=0x00000000, base=0x0000000000000000 [ 711.172626] IPVS: ftp: loaded support on port[0] = 21 [ 711.179859] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 23:54:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/28, &(0x7f00000003c0)=0x1c) [ 711.201814] IDTR: limit=0x00000000, base=0x0000000000000000 [ 711.257089] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 711.292798] IPVS: length: 28 != 24 [ 711.298017] EFER = 0x0000000000006000 PAT = 0x0007040600070406 [ 711.324230] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 711.353103] Interruptibility = 00000008 ActivityState = 00000000 [ 711.382644] *** Host State *** [ 711.395949] RIP = 0xffffffff812047de RSP = 0xffff88818c937400 [ 711.420040] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 23:54:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(0x0, &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:54:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) socketpair(0x0, 0x5, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000040)={0x20, 0x8}) [ 711.455231] FSBase=0000000000000000 GSBase=ffff8881dae00000 TRBase=fffffe0000033000 [ 711.478976] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 711.502709] IPVS: length: 28 != 24 [ 711.513967] CR0=0000000080050033 CR3=00000001d976a000 CR4=00000000001426f0 [ 711.528279] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87e01360 [ 711.561992] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 711.575266] IPVS: length: 28 != 24 [ 711.625177] *** Control State *** 23:54:46 executing program 2: r0 = socket$inet(0x2, 0x3, 0xfffffffc) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 711.665123] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 23:54:46 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) lsetxattr$security_smack_transmute(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000004c0)='TRUE', 0x4, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r1, 0x80, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0x1e}, 0x1}, @in6={0xa, 0x4e20, 0x8001, @loopback, 0x2}}}, 0x118) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) sendmsg$rds(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/168, 0xa8}], 0x1, &(0x7f0000000140)=[@zcopy_cookie={0x10, 0x114, 0xc, 0x1c}], 0x10, 0x4000}, 0x4) ftruncate(r0, 0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r2, &(0x7f0000000200)) [ 711.747937] EntryControls=0000d1ff ExitControls=002fefff [ 711.783410] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 711.801733] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 711.850783] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 711.856943] IPVS: ftp: loaded support on port[0] = 21 [ 711.882791] reason=80000021 qualification=0000000000000000 [ 711.907704] IDTVectoring: info=00000000 errcode=00000000 [ 711.921964] TSC Offset = 0xfffffe8134b734b8 [ 711.930066] EPT pointer = 0x00000001bb27a01e 23:54:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x5, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0485510, &(0x7f00000003c0)={0x500a, 0x1, 0x81, 0xbd35, &(0x7f0000000380)=[{}]}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xffffffffffffff80, 0x3, [0x8, 0x2, 0x200]}, &(0x7f0000000300)=0xe) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000340)={r2, 0x0, 0xf3d1}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x800000000000005) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400000, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) recvmmsg(r1, &(0x7f0000000ac0)=[{{&(0x7f0000000040)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000140)=""/245, 0xf5}, {&(0x7f0000000240)=""/142, 0x8e}, {&(0x7f0000000300)=""/75, 0x4b}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/145, 0x91}], 0x7, &(0x7f0000000580)=""/63, 0x3f, 0xfffffffffffff302}, 0x8}, {{&(0x7f00000005c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000640)=""/230, 0xe6}, {&(0x7f0000000740)=""/172, 0xac}, {&(0x7f0000000800)=""/84, 0x54}, {&(0x7f0000000880)=""/161, 0xa1}, {&(0x7f0000000940)=""/199, 0xc7}], 0x5, &(0x7f0000000a80)=""/4, 0x4, 0x2}, 0x6}], 0x2, 0x10000, &(0x7f0000000b00)) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000d80), &(0x7f0000000dc0)=0x40) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f0000000d00)=""/37, &(0x7f0000000d40)=0x25) sendmsg$xdp(r1, &(0x7f0000000cc0)={&(0x7f0000000b40)={0x2c, 0x4, r2, 0x1e}, 0x10, &(0x7f0000000c80)=[{&(0x7f0000000b80)="895baf4cfd0863f62d0d40bda040f8a0097d6f659cab3f5c721861c798acee78cd098b8baa92232a5d4cc0e3208fc06fabc0009c8e8e05f41ef67e2437b501437de45cc528a829e5521ce574e4398678cf9a0df745a23d565932b7b390219147a579cb44b822488c88498a1072a08ecd7674b407453a49df5026687e5c9c22182e86fe3fec142846913ebdc6d39eaa740a26a59e000ef82e1312b02bb7e882b972a3e017add925a76c", 0xa9}, {&(0x7f0000000c40)="8810e9987fbb1c7e79bf3caeed62fedcb9817430d5f3454042f0", 0x1a}], 0x2, 0x0, 0x0, 0x8801}, 0x80) 23:54:50 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:54:50 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:54:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, r1) [ 715.472743] *** Guest State *** [ 715.476370] CR0: actual=0x0000000000050032, shadow=0x0000000000050012, gh_mask=fffffffffffffff7 [ 715.507973] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 715.525058] CR3 = 0x0000000000000000 23:54:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='team_slave_0\x00') getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x2cf) [ 715.545401] RSP = 0x0000000000000000 RIP = 0x0000000000008000 [ 715.571415] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 715.613116] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 715.644066] IPVS: length: 719 != 24 [ 715.652692] CS: sel=0x3000, attr=0x08093, limit=0xffffffff, base=0x0000000000030000 [ 715.682423] IPVS: length: 719 != 24 [ 715.690901] DS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 715.721710] SS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 715.756228] ES: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 715.788236] FS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 715.824640] GS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 715.852397] GDTR: limit=0x00000000, base=0x0000000000000000 [ 715.875811] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 715.892228] IDTR: limit=0x00000000, base=0x0000000000000000 [ 715.911297] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 715.928782] EFER = 0x0000000000006000 PAT = 0x0007040600070406 [ 715.942430] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 715.958239] Interruptibility = 00000008 ActivityState = 00000000 [ 715.971607] *** Host State *** [ 715.979600] RIP = 0xffffffff812047de RSP = 0xffff88818b0cf400 [ 715.991567] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 716.006319] FSBase=0000000000000000 GSBase=ffff8881dae00000 TRBase=fffffe0000033000 [ 716.021193] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 716.031138] CR0=0000000080050033 CR3=00000001d27a6000 CR4=00000000001426f0 [ 716.039729] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87e01360 [ 716.046852] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 716.068116] *** Control State *** [ 716.074566] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 716.099805] EntryControls=0000d1ff ExitControls=002fefff [ 716.107789] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 716.116126] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 716.129931] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 716.138176] reason=80000021 qualification=0000000000000000 [ 716.166493] IDTVectoring: info=00000000 errcode=00000000 [ 716.182285] TSC Offset = 0xfffffe7eb919f686 [ 716.208458] EPT pointer = 0x00000001cdb1a01e 23:54:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz'}, 0x0, r1) 23:54:51 executing program 4: r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xffad) sendto$unix(r0, 0x0, 0xff30, 0x4000810, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 23:54:51 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f000079d000/0x2000)=nil, &(0x7f00000b8000/0x3000)=nil, 0x2000, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:54:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/28, &(0x7f0000000000)=0x1c) 23:54:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fremovexattr(r0, &(0x7f0000000240)=@known='user.syz\x00') r1 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0xfff, 0x0) mq_getsetattr(r1, &(0x7f0000000300)={0x3ef, 0x1, 0x9, 0x0, 0x2, 0x1, 0x1f, 0x4}, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0185647, &(0x7f00000003c0)={0xfffffff, 0x5, 0x2, [], &(0x7f0000000380)={0x9a090e, 0x9, [], @ptr=0x6}}) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) r1 = syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc018620c, &(0x7f000000dfd0)={0xffffffffffffff56, 0x0, 0x0, 0x0, 0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x82a0}, {r1, 0x1000}], 0x2, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000240)) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x40000000013f}}, 0x20) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x7, 0x5, 0x7ee}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000010c0)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 716.810621] binder: 29673 BINDER_GET_NODE_INFO_FOR_REF: only handle may be non-zero. [ 716.810635] binder: 29673:29675 ioctl c018620c 2000dfd0 returned -22 [ 716.827673] IPVS: length: 28 != 24 23:54:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) r1 = syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc018620c, &(0x7f000000dfd0)={0xffffffffffffff56, 0x0, 0x0, 0x0, 0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x82a0}, {r1, 0x1000}], 0x2, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000240)) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGKBENT(r2, 0x4b46, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000010c0)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 716.865386] raw_sendmsg: syz-executor4 forgot to set AF_INET. Fix it! 23:54:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140)=""/28, &(0x7f00000003c0)=0x1c) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) fcntl$addseals(r0, 0x409, 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x200, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f00000002c0)=0xffffffffffffffc1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000080)={'irlan0\x00', 0x9}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000180)={0x0, @reserved}) fcntl$setown(r0, 0x8, r3) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000240)) 23:54:51 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000240), r1, 0x0, 0x80003, 0x0) [ 716.990689] binder: 29689 BINDER_GET_NODE_INFO_FOR_REF: only handle may be non-zero. [ 716.990703] binder: 29689:29691 ioctl c018620c 2000dfd0 returned -22 23:54:51 executing program 5: [ 717.034285] IPVS: length: 28 != 24 [ 717.050974] cgroup: fork rejected by pids controller in [ 717.051696] IPVS: length: 28 != 24 [ 717.052404] /syz5 23:54:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x10d000, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x400, @loopback}}, 0x401, 0x5, 0x77b4, 0x8, 0x100000001}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r1, 0x9}, &(0x7f0000000140)=0x8) 23:54:51 executing program 4: 23:54:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz'}, 0x0, r1) 23:54:51 executing program 5: [ 717.261336] IPVS: length: 28 != 24 [ 717.277508] IPVS: length: 28 != 24 23:54:52 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/143, &(0x7f0000000100)=0x8f) fstat(r1, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x80000001}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x95, 0x10}, 0xc) syz_open_pts(r1, 0x200) 23:54:52 executing program 4: 23:54:52 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x4000, 0x0) ioctl$TUNATTACHFILTER(r0, 0x400854d5, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x4e, 0x100000000, 0x80, 0x80}, {0x3ff, 0x4, 0x5, 0x7d3}]}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x44e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000340)='veno\x00', 0xffffffffffffff5f) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'veth1_to_bridge\x00', 0xc00}) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="0500ab000000000000000300"], &(0x7f00000017c0)=0x6) 23:54:52 executing program 5: 23:54:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/105, &(0x7f0000000080)=0x69) 23:54:52 executing program 4: 23:54:52 executing program 2: r0 = socket$inet(0x2, 0x800001, 0x6) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x8001, {{0x2, 0x4e24, @rand_addr=0x3ff}}, 0x1, 0x5, [{{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @rand_addr=0x3}}, {{0x2, 0x4e23, @remote}}]}, 0x30c) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000400)={'broute\x00'}, &(0x7f0000000340)=0x50) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:52 executing program 5: [ 717.826896] IPVS: length: 28 != 24 [ 717.840574] IPVS: length: 105 != 24 [ 717.845280] IPVS: length: 28 != 24 [ 717.849613] IPVS: length: 105 != 24 23:54:52 executing program 4: 23:54:52 executing program 5: 23:54:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0) 23:54:52 executing program 4: 23:54:53 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40042406, &(0x7f0000000040)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00') 23:54:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x50) 23:54:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0xfffffffffffffffc) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(r1, 0x0, 0xffffffffffffffff, 0x0, 0x5) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = syz_open_dev$radio(&(0x7f00000005c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a45352, &(0x7f0000000600)={{0x0, 0x7fffffff}, 'port1\x00', 0xc1, 0x10, 0x401, 0x7fff, 0x1, 0x100000000, 0xdf5, 0x0, 0x4, 0xfffffffffffffc01}) r3 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x2, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f00000006c0)=""/12, &(0x7f0000000700)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc2c45513, &(0x7f00000002c0)={{0x0, 0x0, 0x5600, 0x5, 'syz1\x00'}, 0x1, [0x80000001, 0x7fffffff, 0x100000001, 0xbf, 0x10000, 0x2, 0x8, 0x3, 0x7, 0xff, 0x55b, 0x666, 0x2, 0x1ff, 0x2, 0xee3, 0x400, 0x55c8, 0x6, 0x80000000, 0x4, 0x3, 0x0, 0x100, 0xfffffffffffffbff, 0x100000001, 0x8df, 0x6, 0xfffffffffffffff7, 0x1b, 0x2, 0x3c, 0x0, 0x81, 0x0, 0x15c0000000000000, 0x9, 0x0, 0xfffffffffffff000, 0x100000000, 0x3, 0x4bd, 0x5, 0x5, 0xbf6f, 0x3, 0x20, 0x101, 0x678, 0x24, 0x8b7, 0xc00000000000, 0x9, 0x5, 0xeba, 0x8, 0x4, 0x7, 0x2000000000000000, 0x5, 0x1, 0x7fff, 0xfff, 0x80, 0x0, 0x6, 0xfffffffffffffffb, 0x4, 0xf, 0x5, 0x6, 0x8, 0x3, 0x7, 0x5, 0x2, 0x7ff, 0x0, 0x94e, 0x7ff, 0xd4, 0x7, 0xb8b9, 0xfff, 0x9, 0x8001, 0xfffffffffffffffe, 0x6, 0x8000, 0x1, 0xfffffffffffffff9, 0xc891, 0x20, 0xbe, 0x9, 0x4, 0x1, 0x3ff, 0x3ff, 0x7, 0x0, 0x5, 0x2, 0x8e3c, 0x5, 0x10000, 0x8, 0x0, 0x3, 0x800, 0xc, 0x8, 0x1, 0xef6f, 0x8, 0x0, 0x5, 0x0, 0x0, 0x3604, 0x1, 0x44b7, 0x401, 0x0, 0x0, 0x99, 0xfffffffffffff3d6, 0x4], {0x0, 0x989680}}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0c0583b, &(0x7f0000000040)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@setneightbl={0x1c, 0x43, 0x100, 0x70bd28, 0x0, {}, [@NDTA_THRESH3={0x8, 0x4, 0x3}]}, 0x1c}}, 0x0) ioctl$EVIOCGBITSND(r4, 0x80404532, &(0x7f00000001c0)=""/184) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) syz_open_dev$sndctrl(&(0x7f0000000400)='/dev/snd/controlC#\x00', 0x81, 0x430000) syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000540)='nbd\x00') ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000340)={0x7, 0x6}) 23:54:53 executing program 4: [ 718.749716] IPVS: length: 28 != 24 23:54:53 executing program 4: [ 718.774192] IPVS: length: 28 != 24 23:54:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000002c0)="3d026dfbba37a06149cc1e1d1331a2838ce996fc9311cd83411f1a5260b6ab20a588c019d8e53dc85ea2618dadc8e55f195f6a68233b873f6d861dd60f346de62168a7a4c049a437fa507639a3a02142f3813983a4624ea4bfcf95686d7887658b586e2b19d81fcb77affbe137969cd9c5273d48f8a8edb792604e4e1433b4789a467b6824311773fce36ef044bcbb11", 0x90) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @multicast1}}) 23:54:53 executing program 2: time(&(0x7f0000000000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x2d) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) fsetxattr$security_capability(r0, &(0x7f0000000200)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0x0, 0x7fff}, {0xc4, 0x15}], r1}, 0x18, 0x2) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x3, 0x6a, [], 0x9, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/106}, &(0x7f00000001c0)=0x50) [ 719.233237] IPVS: length: 28 != 24 [ 719.264230] IPVS: length: 28 != 24 23:54:54 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x100000000000082, 0x0) read(r0, &(0x7f00000003c0)=""/182, 0x1fc) io_setup(0xff, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) write$FUSE_ATTR(r0, &(0x7f0000000000)={0x78, 0x0, 0x1}, 0x78) 23:54:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, [], [{0xd6, 0x3f, 0x34c, 0x7, 0x1, 0xce9}, {0xa, 0x6, 0x101, 0x9, 0xfffffffffffffffc, 0x7fffffff}], [[], []]}) 23:54:54 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x8031, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)=0x68fc) fstat(r1, &(0x7f0000000200)) 23:54:54 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000180)="606c387bfb54c65749b92505263fae96a074cb516bed5bff571b1a24af778f8537c675fc07950815", 0x28) getsockname(0xffffffffffffffff, 0x0, 0x0) close(r0) 23:54:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000340)={{0x2c, @loopback, 0x4e24, 0x3, 'rr\x00', 0x8, 0xffffffff, 0x34}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x4e22, 0x4, 0xff, 0xed5, 0x7}}, 0x44) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) link(&(0x7f00000000c0)='./bus\x00', &(0x7f00000001c0)='./bus\x00') bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f00000003c0)={@empty, @broadcast, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000440)={@remote, @multicast2, r4}, 0xc) write$P9_RXATTRCREATE(r3, &(0x7f0000000140)={0x383}, 0x7) ioctl$RTC_VL_CLR(r3, 0x7014) write$P9_RSETATTR(r3, &(0x7f0000000040)={0x7}, 0x7) sendfile(r1, r3, &(0x7f0000d83ff8), 0x800000000024) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'lo\x00@\x00', 0x101}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@multicast2, @loopback, @loopback}, 0xc) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000700)=""/4096) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00'}) 23:54:54 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) [ 719.653337] IPVS: length: 28 != 24 [ 719.664645] IPVS: length: 28 != 24 23:54:54 executing program 2: syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x840) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/28, &(0x7f0000000000)=0x1c) r1 = dup2(r0, r0) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) syz_open_dev$mice(&(0x7f0000001180)='/dev/input/mice\x00', 0x0, 0x511341) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000001140)=ANY=[@ANYBLOB="030000000000000000000000000000000100000000000000", @ANYRES32=r0, @ANYBLOB="0000001e0b0000050000000000000000000000000000000008000000000000"]) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x101000) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000100)=""/4096) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000001100)={0xffffffffffff25a0}, 0x1) [ 719.798535] IPVS: length: 28 != 24 [ 719.815511] IPVS: length: 28 != 24 23:54:54 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:54:54 executing program 0: r0 = socket$inet(0x2, 0x44000000000803, 0xffffffffffff) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) socket$inet(0x2, 0x0, 0x10001) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x0, 0x60d64348, 0x400, 0x8, 0x0, 0x80000000, 0x200, 0x2, 0x9, 0x1f, 0x9, 0x3, 0x8, 0x0, 0x8, 0x2, 0xfffffffffffffffe, 0xcdc8, 0x7f, 0x9, 0x1f, 0x4, 0xda6d, 0x3f, 0x5, 0xffffffff, 0x7, 0xfffffffffffffffa, 0x100, 0x6, 0x4, 0x9, 0x9, 0x0, 0x100, 0x3, 0x0, 0x1, 0x4, @perf_config_ext={0xaf, 0x7}, 0x4442, 0x0, 0x9, 0x4, 0xd6, 0x0, 0x100000001}, 0x0, 0x8, r1, 0x2) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x50d3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000440)={&(0x7f0000000340)=""/226, 0x1000, 0x1800, 0x4}, 0x18) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={0x4, {0x2, 0x4e20, @remote}, {0x2, 0x4e20, @empty}, {0x2, 0x4e20, @remote}, 0x4, 0xffff, 0x1000, 0x800, 0x2, &(0x7f0000000240)='ip6gretap0\x00', 0x2, 0x0, 0x6}) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x6) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f00000017c0)=0x6) [ 719.902930] IPVS: length: 28 != 24 23:54:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x240) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 720.044359] IPVS: length: 28 != 24 23:54:54 executing program 0: r0 = socket$inet(0x2, 0x4000001000000001, 0x2) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:54:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x100, 0x0) r1 = memfd_create(&(0x7f0000000000)='{\x00', 0x5) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000080)={0x0, 0x1, 0x1, &(0x7f0000000040)=0x6}) [ 720.166026] IPVS: length: 28 != 24 [ 720.186252] IPVS: length: 28 != 24 [ 721.908146] device bridge_slave_1 left promiscuous mode [ 721.914431] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.972759] device bridge_slave_0 left promiscuous mode [ 721.979025] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.346869] team0 (unregistering): Port device team_slave_1 removed [ 724.357373] team0 (unregistering): Port device team_slave_0 removed [ 724.369622] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 724.432433] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 724.508611] bond0 (unregistering): Released all slaves [ 725.852016] IPVS: ftp: loaded support on port[0] = 21 [ 726.319528] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.325971] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.333398] device bridge_slave_0 entered promiscuous mode [ 726.363548] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.370014] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.376996] device bridge_slave_1 entered promiscuous mode [ 726.408270] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 726.439306] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 726.524315] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 726.557421] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 726.689158] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 726.696379] team0: Port device team_slave_0 added [ 726.724850] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 726.732265] team0: Port device team_slave_1 added [ 726.762523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 726.792490] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 726.823393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 726.853967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 727.137194] bridge0: port 2(bridge_slave_1) entered blocking state [ 727.143618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 727.150381] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.156742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 728.182214] 8021q: adding VLAN 0 to HW filter on device bond0 [ 728.282193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 728.379956] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 728.386110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 728.393828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 728.492835] 8021q: adding VLAN 0 to HW filter on device team0 [ 729.139524] IPVS: set_ctl: invalid protocol: 44 127.0.0.1:20004 [ 729.151521] device lo entered promiscuous mode [ 729.157204] device lo left promiscuous mode [ 729.164821] IPVS: set_ctl: invalid protocol: 44 127.0.0.1:20004 [ 729.177147] device lo entered promiscuous mode [ 729.184781] device lo left promiscuous mode 23:55:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002040)='/dev/dlm-control\x00', 0x40000, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) fstat(r1, &(0x7f00000020c0)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000002140)) sendmsg$nl_netfilter(r3, &(0x7f0000002680)={&(0x7f0000002080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002640)={&(0x7f0000000980)=ANY=[@ANYBLOB="ac0000000d03080026bd7000ffdbdf250d0001025bf2750b56e74d785d228f5c45d7947d77bfa076ebe2deba7ba6ee14bb3440c1f114df2d2afc4395e61460a9a50dbed558b2af5d83af3cb69231a6a3092a3c188ef1c3638de00f03956a62775bf8c6474bcfaf0991e71983b2c8c28fa545f3a97d0d194659b85e7bb4c05a6debda5631141b846e322167fe656aaa6399af5991506e02ef3e4176f8ce533b4ba0659bc4ad7c3e675eff0000f03df61517d9f3eb6a555b6d33417f916ab9aeb66661237d0c86b7d2ccff367c2241b083b579e66aefbfdae527ef2d918289411a54c09ebd"], 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x4000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000100)={{{@in=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) futex(&(0x7f0000000080)=0x2, 0xf, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)=0x2, 0x0) flistxattr(r3, &(0x7f0000000400)=""/168, 0xa8) epoll_wait(r4, &(0x7f00000000c0)=[{}, {}], 0x2, 0x8) unshare(0x40000000) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x20000002e0402, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f00000002c0)={0x0, 0x1ec4, 0xffe, &(0x7f0000000040)}) setsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000300), 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000580)=""/177) sendto$inet6(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x17d}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 23:55:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'team_slave_0\x00', 0x7ae8ec0c}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:55:04 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) fstat(r0, &(0x7f0000000040)) 23:55:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000000500)=[{{&(0x7f00000002c0)=@generic, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)=""/195, 0xc3}], 0x1, &(0x7f0000000440)=""/147, 0x93, 0x6}, 0x3129}], 0x1, 0x1, &(0x7f0000000540)={0x77359400}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:04 executing program 4: pselect6(0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffff}, &(0x7f0000000280)={0x10000}, 0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x0, 0x7, 0x0, 0x0, 0x0, 0x100000002}, &(0x7f00000000c0)={0x0, 0x4}, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2000c2604110, &(0x7f0000000080)) 23:55:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz'}, 0x0, r1) [ 729.361257] IPVS: length: 28 != 24 [ 729.371689] IPVS: length: 28 != 24 23:55:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000003, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/28, &(0x7f00000003c0)=0x1c) 23:55:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0xf2}, &(0x7f0000000040)=0x8) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x5) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000080)={r1, 0x50}, 0x8) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000180)=""/28, &(0x7f00000001c0)=0xffffff08) [ 729.750160] IPVS: ftp: loaded support on port[0] = 21 23:55:04 executing program 2: r0 = socket$inet(0x2, 0x800, 0x2000) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:55:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390", 0x3, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:04 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000280)=""/4096) mprotect(&(0x7f0000845000/0x2000)=nil, 0x2000, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000080)={[], 0x0, 0x8, 0x22, 0x4, 0xa, r2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:55:04 executing program 2: r0 = socket$inet(0x2, 0x80000, 0x9) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 23:55:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x101002, 0x0) linkat(r1, &(0x7f0000000400)='./file0\x00', r0, &(0x7f0000000440)='./file0\x00', 0x1000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000002c0)=""/230, &(0x7f0000000240)=0xe6) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', 0x0, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc2c45513, &(0x7f0000000040)={{0x7, 0x4, 0xff, 0x0, '\x00', 0xffffffffffffffff}, 0x1, [0x7, 0x100000000, 0x7, 0x0, 0x3d, 0x5, 0x5b, 0x4ac6, 0x2, 0x3f, 0x6, 0xe3, 0x2, 0x2, 0x3, 0x31b, 0x4ff, 0x3, 0x7, 0x8000, 0x448, 0x1, 0x8, 0x4, 0x3, 0x5, 0x10001, 0x42, 0x6, 0x81, 0x9, 0x0, 0x4, 0x4, 0xe9e3, 0xcf, 0x81, 0x80000001, 0x3, 0x3, 0x1, 0x9, 0xff, 0x0, 0x80000000, 0x0, 0x5, 0x6, 0x9, 0x5, 0x7, 0x4, 0x4, 0x7, 0x6, 0x4, 0x7, 0x7fff, 0x0, 0x2, 0x400, 0x10000, 0x3f, 0x5, 0x7, 0x5, 0x3, 0x1000, 0x2, 0x0, 0x8000, 0x1, 0x5, 0x0, 0x0, 0x7, 0x3f, 0x7, 0x1, 0x200, 0x0, 0x1, 0x6, 0x80, 0xfffffffffffffffe, 0x94aa, 0x401, 0xfff, 0xfffffffffffffff9, 0x5, 0x7, 0x6, 0x3e4, 0x6, 0xf8, 0x100000000, 0x3, 0x5, 0x7f, 0xfffffffffffffffd, 0xffff, 0x80000001, 0x100000001, 0xfffffffffffffffd, 0x80000001, 0x5, 0x1ff, 0x8001, 0x0, 0x8, 0x8000, 0x2, 0x0, 0x6, 0x7fffffff, 0x0, 0x3ff, 0x800, 0x5, 0x69187980, 0x330, 0x282d, 0x2, 0x2, 0xfffffffffffffff8, 0x80000001, 0x6, 0x3]}) [ 730.464933] IPVS: length: 28 != 24 [ 730.480475] IPVS: length: 28 != 24 23:55:05 executing program 2: r0 = timerfd_create(0xf, 0x80000) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000140)) r1 = socket$inet(0x2, 0x4000000000000001, 0x100000000) sendto$inet(r1, &(0x7f0000000040)="a7ecbc5b6b65c10170bce705ae68a26b7489225a8d0694f07ce27755bbf1a6d6e779238652053da052be48a3734db549a158dccf561fb3072621a14243af35aa7c568e252e7b9f3779007f7942ba1102be6f08383fe7c0e3aa45b4701c9008e0c0136c5abd45793f7eb4f6aa82fb8b714a40ee67823da978300148bd62e276ad8817c5bce7bc0c707879135d64425d9c22ad91d479f3c8430f8c9b232c054e32e7898c8c0f1d6a3fd02d941ab979df8557ca6f730bb2f3927ccaf69a06cad9f1aa58b3d4459709bd1a9a1b2ba16bb942247104b31849", 0xd6, 0x54, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x10) flock(r1, 0x8) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:55:05 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x102) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c45513, &(0x7f0000000040)={{0x1, 0x0, 0x2, 0xe484, '\x00', 0x7}, 0x1, [0x974, 0x8f9b3ce, 0x4, 0x9, 0x6, 0x3, 0x4, 0x4, 0x4, 0x2, 0x3, 0x9, 0x5, 0x5, 0xfffffffffffffff7, 0x84, 0x80, 0xfffffffffffffffc, 0x7, 0xffffffffffffffe1, 0x8, 0x0, 0x1, 0x101, 0xffffffff, 0x4, 0x8, 0x1, 0xffffffff00000001, 0x3, 0x401, 0x80000001, 0x4, 0x100000000, 0x9, 0x8f19, 0x9, 0x3, 0x3, 0x80000001, 0x1, 0x5, 0x800, 0xffffffffffffffe1, 0xb26d, 0x7f, 0x4, 0x84, 0x0, 0x5, 0x2, 0x0, 0x0, 0xfffffffffffff43b, 0x1, 0x6, 0x5, 0x2, 0x5, 0x5, 0x800, 0x9, 0x4, 0x3, 0xfffffffffffffe00, 0x9, 0x5, 0x0, 0x0, 0xfffffffffffff1c8, 0x401, 0x79, 0x9, 0x1, 0x1000, 0xd1800000000000, 0x80000000, 0x8, 0x7, 0x2, 0x6, 0x6, 0x7, 0x7, 0x81, 0x3, 0x8, 0x6, 0xfffffffffffffffe, 0x1, 0x0, 0x80, 0xffff, 0xb35, 0x6, 0x0, 0x5, 0x2f, 0x5, 0xffffffffffffffe2, 0x2, 0x0, 0x100, 0xf6b1, 0x101, 0x1ad, 0x2, 0x4, 0x0, 0x52, 0x8000, 0x0, 0xd5f6, 0x8, 0x8, 0x7, 0x9, 0xfffffffffffffffd, 0x6, 0x0, 0x2, 0x7fff, 0xe7d8, 0x4, 0x1f, 0x6, 0x7fff, 0x80000001], {0x77359400}}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000400)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000340)) 23:55:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/83, &(0x7f0000000080)=0x53) [ 730.698634] IPVS: length: 28 != 24 [ 730.716146] IPVS: length: 28 != 24 23:55:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x800, {0x2, 0x4e24, @local}, {0x2, 0x4e21, @rand_addr=0x9}, {0x2, 0x4e22, @empty}, 0x1, 0x9, 0x3f, 0x0, 0x8, &(0x7f0000000000)='team0\x00', 0x2, 0x2, 0x6}) r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x6, 0x80) ioctl$EVIOCGSW(r1, 0x8040451b, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x420002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r3, 0x1}}, 0x10) 23:55:05 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000004c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000540)='net/snmp\x00') getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x1b, 0x40, 0x9d59, 0x40, 0x8}, &(0x7f0000000440)=0x14) nanosleep(&(0x7f00000003c0), &(0x7f0000000500)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000480)={r2, 0xf77}, 0x8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x426800, 0x160) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) flock(r1, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r5, &(0x7f00000000c0)) setsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000140)=0x3, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000200), &(0x7f00000001c0)=0x218) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r6) sendmsg$netlink(r9, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x12b, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000001000000010000d94caf88f217880de1ac9db742ffbdf0cb98d70a25ebcd83e7742d72f061f038beea9b266ef0f42fbf73b97984", @ANYRES32=r7], 0x18}, 0x0) recvmmsg(r7, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f0000000180)=0x1, 0x4) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000640)="23f458d75ba3d450541c748730ed2d7fbce4e57ebbf3e44bf88250680f154acdfc08411377494b0c4d9f0ddbe990592934eacdad5b2e6e018d952b5e8ab0654d9ffd87de2e9d27d8219854c6d003978d03c539f3b12422b63753d747d284f67634d2be710c10eeb54b10b45058bbd1e0990e2eeab00f5d3606f8ba1058fc96883e1895334664065ad5bb35ba378fa1f123bd9347eb91f273610bb381a925ef0b7028ced14d170ff8c7bb705d5bb92c2230712689a942403c236f96e480201c121481a6d1ced46ff8b784682a99e1e42b5822a5fe1f60b098366656a9629efc17b4bab055283a7fbb1b87597934d97ea700") r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="000a2abd7000fbdbdf251000000059000300080007004e240000080001000200000008000800ff00000008000600cb010000001c00020008000600ff0f00000800030007000000080007000900000008000500020000"], 0x5c}}, 0x4008004) 23:55:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x82f) keyctl$instantiate(0xc, r1, &(0x7f00000000c0)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'bdevkeyring\'', 0x20, 0x7fe000}, 0x36, 0xfffffffffffffffd) clone(0x4000, &(0x7f0000000100)="c47706a49dcf80604a525d09a26267657f700ffb7c10281f641cd35aa29771d17bac3c41dd50624cfcddf807dde2136d3c1eabcf3b447a5e33e498c2ffa6a057b613cb8086263cabf5f2baa876cb1ede7a292795fc33196b3c894a227154d4b8cf79d60a8fd061861005bdbd43074a95ef0c46e74b3ae757f67e21851c3d7e7ae6fb8f", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="8c5b349c2a072a5cb1e8c546c678e23070dfd3ebff7a43517f3492fc576e668da28465f3c220ebe13ceb1de9ab147f7a61ffc4c2c61720b5d2945f92482f80528beed4c0c023c2eb52b2b669121414e6326e40b680d2a9da9a20b2fb2e204ac0e4d3fe1706659c1e4a7123778cbe9cf5a66a51ee0f111bbf46715f579912e3e0bc5186c69915fe9861") [ 730.967952] IPVS: length: 28 != 24 [ 730.983680] IPVS: length: 28 != 24 [ 731.058964] IPVS: length: 28 != 24 [ 731.091123] IPVS: length: 28 != 24 23:55:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)=0x5) r1 = accept4$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x80000) socketpair$inet6(0xa, 0x80004, 0x2400000, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x18040, 0x0) ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, &(0x7f0000000540)=""/134) ioctl$VIDIOC_G_PRIORITY(r4, 0x80045643, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x6}, 0x8) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x808}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0xbd, r5, 0x1e, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10001}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x724261ce}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2a, 0x1}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffe}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @remote}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}]}, 0xfffffffffffffd92}, 0x1, 0x0, 0x0, 0x20044010}, 0x1) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:55:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x84000) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x2, 0x0, 0xc14, 0xf, 0xb, 0x0, 0x70bd28, 0x25dfdbfb, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @multicast2}}, @sadb_x_sa2={0x2, 0x13, 0x3, 0x0, 0x0, 0x70bd27, 0x3500}, @sadb_ident={0x2, 0xb, 0x8, 0x0, 0x3}]}, 0x58}}, 0x40841) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) ftruncate(r0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) [ 731.270235] IPVS: length: 28 != 24 23:55:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/83, &(0x7f0000000080)=0x53) 23:55:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', 0x0, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/28, &(0x7f0000000040)=0x70) [ 731.475973] IPVS: length: 112 != 24 23:55:06 executing program 2: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) [ 731.640136] IPVS: length: 28 != 24 [ 731.726171] IPVS: length: 28 != 24 23:55:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x968fbfadcd10f561, @multicast2, 0x4e24, 0x1, 'rr\x00', 0x21, 0x6d, 0x2c}, {@multicast1, 0x4e22, 0x0, 0x7f, 0x400, 0x9}}, 0x44) 23:55:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/83, &(0x7f0000000080)=0x53) 23:55:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 731.909090] IPVS: length: 28 != 24 [ 731.913311] IPVS: set_ctl: invalid protocol: 62817 224.0.0.2:20004 [ 731.942521] IPVS: length: 28 != 24 [ 731.948296] IPVS: set_ctl: invalid protocol: 62817 224.0.0.2:20004 23:55:06 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000080)=""/172) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:55:06 executing program 2: r0 = socket$inet(0x2, 0x0, 0xfffffffffffffffe) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:55:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x200000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000000)="5753f0c1b055b9f48eab", 0xa) 23:55:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) move_pages(r3, 0x7, &(0x7f00000002c0)=[&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000c9d000/0x4000)=nil], &(0x7f0000000300)=[0x2, 0xffff, 0x1, 0x4], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000380)={0x4, 0x800, 0x8200, 0x3, 0x9, 0x67ac, 0x9, 0x2, 0x0}, &(0x7f00000003c0)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000440)={r4, 0x6}, 0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) [ 732.209054] IPVS: length: 28 != 24 23:55:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 732.247726] IPVS: length: 28 != 24 23:55:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x10000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x80, 0x0) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f00000002c0)) syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x1975, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000080)={r0, r4}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000000c0)=0x1c) 23:55:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:55:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000140)={0x268, &(0x7f0000000000)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4008641c, &(0x7f0000000100)={r1, &(0x7f00000000c0)=""/11}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:55:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000000, 0x3ffffffffffc) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000000c0)={'bond_slave_0\x00', @random="3ba7fe804e9e"}) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000040)={0x6, 0x1ff}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/28, &(0x7f00000003c0)=0xfffffffffffffe14) [ 732.527272] IPVS: length: 28 != 24 [ 732.533148] IPVS: length: 28 != 24 23:55:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:55:07 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000100)={0x8000, 0x3f, 0x40, 0xd62d}, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0xa492, {{0xa, 0x4e24, 0x400, @local, 0x5}}}, 0x84) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:55:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x482, &(0x7f0000000380)=""/28, &(0x7f00000003c0)=0x1c) 23:55:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 733.046721] IPVS: length: 28 != 8 23:55:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) 23:55:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e26, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000240)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:08 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000040)={0xfffffffffffffff7, "6ffaa0763647b59ed54267e9b29542180e1018c1b0be7cddbf5a5d7aebcb2ec8", 0x0, 0x5, 0x9, 0x1b, 0x7}) fstat(r1, &(0x7f0000000200)) 23:55:08 executing program 2 (fault-call:10 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 733.759201] FAULT_INJECTION: forcing a failure. [ 733.759201] name failslab, interval 1, probability 0, space 0, times 0 [ 733.787806] CPU: 0 PID: 30337 Comm: syz-executor2 Not tainted 4.20.0-rc4+ #261 [ 733.795232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.804610] Call Trace: 23:55:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 733.807239] dump_stack+0x244/0x39d [ 733.810903] ? dump_stack_print_info.cold.1+0x20/0x20 [ 733.816125] ? debug_smp_processor_id+0x1c/0x20 [ 733.820814] ? perf_trace_lock+0x14d/0x7a0 [ 733.825077] should_fail.cold.4+0xa/0x17 [ 733.829165] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 733.834378] ? debug_smp_processor_id+0x1c/0x20 [ 733.839079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.844636] ? check_preemption_disabled+0x48/0x280 [ 733.849679] ? lock_unpin_lock+0x4a0/0x4a0 [ 733.853938] ? debug_smp_processor_id+0x1c/0x20 [ 733.853967] ? perf_trace_lock+0x14d/0x7a0 [ 733.853991] ? zap_class+0x640/0x640 [ 733.854022] ? find_held_lock+0x36/0x1c0 [ 733.854049] ? __lock_is_held+0xb5/0x140 [ 733.854085] ? perf_trace_sched_process_exec+0x860/0x860 [ 733.854106] ? mem_cgroup_update_lru_size+0xd0/0xd0 [ 733.885319] __should_failslab+0x124/0x180 [ 733.889579] should_failslab+0x9/0x14 [ 733.893393] kmem_cache_alloc_node+0x26e/0x730 [ 733.898008] ? print_usage_bug+0xc0/0xc0 [ 733.902094] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 733.907406] __alloc_skb+0x119/0x770 [ 733.911232] ? check_preemption_disabled+0x48/0x280 [ 733.916276] ? netdev_alloc_frag+0x1f0/0x1f0 [ 733.920720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.926278] ? tcp_established_options+0x36f/0x5c0 [ 733.931234] ? tcp_select_initial_window+0x400/0x400 [ 733.936369] ? print_usage_bug+0xc0/0xc0 [ 733.940474] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 733.945512] ? tcp_current_mss+0x2ac/0x410 [ 733.949770] ? tcp_mtu_to_mss+0x4e0/0x4e0 [ 733.953945] sk_stream_alloc_skb+0x141/0x970 [ 733.958387] ? tcp_init_transfer+0x470/0x470 [ 733.962813] ? tcp_rate_check_app_limited+0x121/0x460 [ 733.968034] ? tcp_fastopen_reset_cipher.cold.12+0x50/0x50 [ 733.973689] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 733.978798] tcp_sendmsg_locked+0xee4/0x3fa0 [ 733.983244] ? debug_smp_processor_id+0x1c/0x20 [ 733.987939] ? perf_trace_lock+0x14d/0x7a0 [ 733.992211] ? lock_is_held_type+0x210/0x210 [ 733.996661] ? tcp_sendpage+0x60/0x60 [ 734.000486] ? lock_is_held_type+0x210/0x210 [ 734.004948] ? find_held_lock+0x36/0x1c0 [ 734.009049] ? mark_held_locks+0xc7/0x130 [ 734.013219] ? __local_bh_enable_ip+0x160/0x260 [ 734.017914] ? __local_bh_enable_ip+0x160/0x260 [ 734.022606] ? trace_hardirqs_on+0xbd/0x310 [ 734.026953] ? lock_release+0xa00/0xa00 [ 734.030939] ? lock_sock_nested+0xe2/0x120 [ 734.035184] ? trace_hardirqs_off_caller+0x310/0x310 [ 734.040299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.045847] ? check_preemption_disabled+0x48/0x280 [ 734.050891] ? lock_sock_nested+0x9a/0x120 [ 734.055138] ? lock_sock_nested+0x9a/0x120 [ 734.059386] ? __local_bh_enable_ip+0x160/0x260 [ 734.064080] tcp_sendmsg+0x2f/0x50 [ 734.067641] inet_sendmsg+0x1a1/0x690 [ 734.071489] ? ipip_gro_receive+0x100/0x100 [ 734.075823] ? apparmor_socket_sendmsg+0x29/0x30 [ 734.080594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.086158] ? security_socket_sendmsg+0x94/0xc0 [ 734.090937] ? ipip_gro_receive+0x100/0x100 [ 734.095278] sock_sendmsg+0xd5/0x120 [ 734.099016] sock_write_iter+0x35e/0x5c0 [ 734.103106] ? sock_sendmsg+0x120/0x120 [ 734.107140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 734.112706] ? iov_iter_init+0xe5/0x210 [ 734.116700] __vfs_write+0x6b8/0x9f0 [ 734.120441] ? kernel_read+0x120/0x120 [ 734.124342] ? apparmor_path_rmdir+0x30/0x30 [ 734.128780] ? apparmor_file_permission+0x24/0x30 [ 734.133643] ? rw_verify_area+0x118/0x360 [ 734.137823] vfs_write+0x1fc/0x560 [ 734.141403] ksys_write+0x101/0x260 [ 734.145045] ? __ia32_sys_read+0xb0/0xb0 [ 734.149125] ? trace_hardirqs_off_caller+0x310/0x310 [ 734.154249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.159809] ? __do_page_fault+0x491/0xe60 [ 734.164069] __ia32_sys_write+0x71/0xb0 [ 734.168063] do_fast_syscall_32+0x34d/0xfb2 [ 734.172409] ? do_int80_syscall_32+0x890/0x890 [ 734.177016] ? entry_SYSENTER_compat+0x68/0x7f [ 734.181613] ? trace_hardirqs_off_caller+0xbb/0x310 [ 734.186646] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 734.191502] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 734.196367] ? trace_hardirqs_on_caller+0x310/0x310 [ 734.201423] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 734.206459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.212032] ? prepare_exit_to_usermode+0x291/0x3b0 [ 734.217078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 734.221954] entry_SYSENTER_compat+0x70/0x7f [ 734.226376] RIP: 0023:0xf7f27a29 [ 734.229752] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 734.248669] RSP: 002b:00000000f5f230cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 734.256399] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000100 [ 734.263694] RDX: 000000000000ff5a RSI: 0000000000000000 RDI: 0000000000000000 [ 734.270985] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 734.278270] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 734.285560] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:55:09 executing program 5 (fault-call:3 fault-nth:0): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:09 executing program 4 (fault-call:8 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) [ 734.560824] FAULT_INJECTION: forcing a failure. [ 734.560824] name failslab, interval 1, probability 0, space 0, times 0 23:55:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)=ANY=[@ANYBLOB="f9f7ff090010"], &(0x7f00000017c0)=0x6) [ 734.667816] CPU: 1 PID: 30349 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #261 [ 734.675255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.684626] Call Trace: [ 734.687248] dump_stack+0x244/0x39d [ 734.690912] ? dump_stack_print_info.cold.1+0x20/0x20 [ 734.696135] ? debug_smp_processor_id+0x1c/0x20 [ 734.700820] ? perf_trace_lock+0x14d/0x7a0 [ 734.705081] should_fail.cold.4+0xa/0x17 [ 734.709164] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 734.714330] ? __f_unlock_pos+0x19/0x20 [ 734.718327] ? lock_downgrade+0x900/0x900 [ 734.722502] ? proc_fail_nth_write+0x9e/0x210 [ 734.727041] ? find_held_lock+0x36/0x1c0 [ 734.731149] ? perf_trace_sched_process_exec+0x860/0x860 [ 734.736617] ? check_preemption_disabled+0x48/0x280 [ 734.741677] __should_failslab+0x124/0x180 [ 734.745946] should_failslab+0x9/0x14 [ 734.749761] kmem_cache_alloc+0x2be/0x730 [ 734.753927] ? do_fast_syscall_32+0x150/0xfb2 [ 734.758440] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 734.763050] getname_flags+0xd0/0x590 [ 734.766872] __ia32_compat_sys_execveat+0xd4/0x140 [ 734.771832] do_fast_syscall_32+0x34d/0xfb2 [ 734.776175] ? do_int80_syscall_32+0x890/0x890 [ 734.780787] ? entry_SYSENTER_compat+0x68/0x7f [ 734.785386] ? trace_hardirqs_off_caller+0xbb/0x310 [ 734.790519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 734.795381] ? trace_hardirqs_on_caller+0x310/0x310 [ 734.800426] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 734.805464] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 734.812169] ? __switch_to_asm+0x40/0x70 [ 734.816251] ? __switch_to_asm+0x34/0x70 [ 734.820343] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 734.825227] entry_SYSENTER_compat+0x70/0x7f [ 734.829667] RIP: 0023:0xf7f00a29 [ 734.833056] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 734.851972] RSP: 002b:00000000f5efc0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 734.859719] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 734.867100] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 734.874400] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 734.881687] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 734.888981] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:55:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 735.165938] FAULT_INJECTION: forcing a failure. [ 735.165938] name failslab, interval 1, probability 0, space 0, times 0 [ 735.215871] CPU: 1 PID: 30366 Comm: syz-executor4 Not tainted 4.20.0-rc4+ #261 [ 735.223296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.232668] Call Trace: [ 735.235286] dump_stack+0x244/0x39d [ 735.238952] ? dump_stack_print_info.cold.1+0x20/0x20 [ 735.244176] ? debug_smp_processor_id+0x1c/0x20 [ 735.248872] ? perf_trace_lock+0x14d/0x7a0 [ 735.253157] should_fail.cold.4+0xa/0x17 [ 735.257251] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 735.262381] ? print_usage_bug+0xc0/0xc0 [ 735.266498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.272057] ? check_preemption_disabled+0x48/0x280 [ 735.277111] ? group_sched_in+0x17d/0x400 [ 735.281282] ? lock_unpin_lock+0x4a0/0x4a0 [ 735.285534] ? perf_trace_lock+0x14d/0x7a0 [ 735.289788] ? zap_class+0x640/0x640 [ 735.293534] ? find_held_lock+0x36/0x1c0 [ 735.297620] ? __lock_is_held+0xb5/0x140 [ 735.301713] ? ip_tunnel_encap_setup+0x368/0x730 [ 735.306509] ? perf_trace_sched_process_exec+0x860/0x860 [ 735.311999] __should_failslab+0x124/0x180 [ 735.316253] should_failslab+0x9/0x14 [ 735.320161] kmem_cache_alloc_node+0x26e/0x730 [ 735.324769] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 735.330243] ? print_usage_bug+0xc0/0xc0 [ 735.334336] __alloc_skb+0x119/0x770 [ 735.338067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.342856] ? netdev_alloc_frag+0x1f0/0x1f0 [ 735.347303] ? mark_held_locks+0xc7/0x130 [ 735.351491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.356306] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 735.360918] ? retint_kernel+0x2d/0x2d [ 735.364834] ? trace_hardirqs_on_caller+0xc0/0x310 [ 735.369782] ? tcp_current_mss+0x198/0x410 [ 735.374072] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.378849] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 735.384328] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 735.389364] ? tcp_current_mss+0x2ac/0x410 [ 735.393620] ? tcp_mtu_to_mss+0x4e0/0x4e0 [ 735.397787] sk_stream_alloc_skb+0x141/0x970 [ 735.402214] ? tcp_init_transfer+0x470/0x470 [ 735.406640] ? retint_kernel+0x2d/0x2d [ 735.410567] tcp_sendmsg_locked+0xee4/0x3fa0 [ 735.414994] ? debug_smp_processor_id+0x1c/0x20 [ 735.419692] ? perf_trace_lock+0x14d/0x7a0 [ 735.423939] ? mark_held_locks+0x130/0x130 [ 735.428197] ? lock_is_held_type+0x210/0x210 [ 735.432629] ? trace_hardirqs_on_caller+0xc0/0x310 [ 735.437603] ? tcp_sendpage+0x60/0x60 [ 735.441429] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.446201] ? retint_kernel+0x2d/0x2d [ 735.450101] ? trace_hardirqs_on_caller+0xc0/0x310 [ 735.455051] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.459824] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 735.465288] ? find_held_lock+0x36/0x1c0 [ 735.469379] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.474154] ? retint_kernel+0x2d/0x2d [ 735.478062] ? lock_sock_nested+0x9a/0x120 [ 735.482323] ? __local_bh_enable_ip+0x193/0x260 [ 735.487016] tcp_sendmsg+0x2f/0x50 [ 735.490576] inet_sendmsg+0x1a1/0x690 [ 735.494389] ? ipip_gro_receive+0x100/0x100 [ 735.498726] ? apparmor_socket_sendmsg+0x29/0x30 [ 735.503511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.509083] ? security_socket_sendmsg+0x94/0xc0 [ 735.513945] ? ipip_gro_receive+0x100/0x100 [ 735.518289] sock_sendmsg+0xd5/0x120 [ 735.522022] sock_write_iter+0x35e/0x5c0 [ 735.526106] ? sock_sendmsg+0x120/0x120 [ 735.530122] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 735.535678] ? iov_iter_init+0xe5/0x210 [ 735.539693] __vfs_write+0x6b8/0x9f0 [ 735.543436] ? kernel_read+0x120/0x120 [ 735.547340] ? apparmor_path_rmdir+0x30/0x30 [ 735.551779] ? apparmor_file_permission+0x24/0x30 [ 735.556646] ? rw_verify_area+0x118/0x360 [ 735.560812] vfs_write+0x1fc/0x560 [ 735.564382] ksys_write+0x101/0x260 [ 735.568027] ? __ia32_sys_read+0xb0/0xb0 [ 735.572108] ? trace_hardirqs_off_caller+0x310/0x310 [ 735.577228] ? percpu_ref_get_many+0x240/0x240 [ 735.581832] ? prepare_exit_to_usermode+0x342/0x3b0 [ 735.586888] __ia32_sys_write+0x71/0xb0 [ 735.590897] do_fast_syscall_32+0x34d/0xfb2 [ 735.595254] ? do_int80_syscall_32+0x890/0x890 [ 735.599856] ? entry_SYSENTER_compat+0x68/0x7f [ 735.604461] ? trace_hardirqs_off_caller+0xbb/0x310 [ 735.609503] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 735.614453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 735.619317] ? trace_hardirqs_on_caller+0x310/0x310 [ 735.624352] ? prepare_exit_to_usermode+0x291/0x3b0 [ 735.629389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 735.634258] entry_SYSENTER_compat+0x70/0x7f [ 735.638698] RIP: 0023:0xf7f8ba29 [ 735.642079] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 23:55:10 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r2, 0x7}, 0x8) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="f14e1eb6a819", 0x6) fstat(r1, &(0x7f0000000200)) 23:55:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:10 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 735.660994] RSP: 002b:00000000f5f870cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 735.661011] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000100 [ 735.661021] RDX: 000000000000ff5a RSI: 0000000000000000 RDI: 0000000000000000 [ 735.661030] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 735.661045] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 735.683404] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:55:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x10c00, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={r0}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000300)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:10 executing program 4 (fault-call:8 fault-nth:1): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:10 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xa00) 23:55:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff8) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:10 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00) [ 736.066281] FAULT_INJECTION: forcing a failure. [ 736.066281] name failslab, interval 1, probability 0, space 0, times 0 [ 736.146057] CPU: 1 PID: 30391 Comm: syz-executor4 Not tainted 4.20.0-rc4+ #261 [ 736.153487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.162857] Call Trace: [ 736.165486] dump_stack+0x244/0x39d [ 736.169146] ? dump_stack_print_info.cold.1+0x20/0x20 [ 736.174363] ? should_fail+0x8f3/0xd01 [ 736.178265] ? should_fail+0x906/0xd01 [ 736.182174] should_fail.cold.4+0xa/0x17 [ 736.186269] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 736.191386] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 736.196873] ? zap_class+0x640/0x640 [ 736.200629] ? find_held_lock+0x36/0x1c0 [ 736.204714] ? __lock_is_held+0xb5/0x140 [ 736.208809] ? zap_class+0x640/0x640 [ 736.212536] ? perf_trace_sched_process_exec+0x860/0x860 [ 736.218007] ? check_preemption_disabled+0x48/0x280 [ 736.223050] __should_failslab+0x124/0x180 [ 736.227298] should_failslab+0x9/0x14 [ 736.231109] kmem_cache_alloc_node_trace+0x270/0x740 [ 736.236233] __kmalloc_node_track_caller+0x3c/0x70 [ 736.241174] __kmalloc_reserve.isra.40+0x41/0xe0 [ 736.245948] __alloc_skb+0x155/0x770 [ 736.249680] ? netdev_alloc_frag+0x1f0/0x1f0 [ 736.254107] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 736.258887] ? retint_kernel+0x2d/0x2d [ 736.262793] ? sk_stream_alloc_skb+0x646/0x970 [ 736.267392] sk_stream_alloc_skb+0x141/0x970 [ 736.271813] ? tcp_init_transfer+0x470/0x470 [ 736.276248] ? tcp_send_mss+0x2b/0x2c0 [ 736.280142] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 736.285177] tcp_sendmsg_locked+0xee4/0x3fa0 [ 736.289602] ? debug_smp_processor_id+0x1c/0x20 [ 736.294280] ? perf_trace_lock+0x14d/0x7a0 [ 736.298532] ? lock_is_held_type+0x210/0x210 [ 736.302950] ? trace_hardirqs_on_caller+0xc0/0x310 [ 736.307903] ? tcp_sendpage+0x60/0x60 [ 736.311714] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 736.316485] ? retint_kernel+0x2d/0x2d [ 736.320385] ? trace_hardirqs_on_caller+0xc0/0x310 [ 736.325324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 736.330092] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 736.335551] ? find_held_lock+0x36/0x1c0 [ 736.339638] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 736.344408] ? retint_kernel+0x2d/0x2d [ 736.348310] ? lock_sock_nested+0x9a/0x120 [ 736.352564] ? __local_bh_enable_ip+0x193/0x260 [ 736.357255] tcp_sendmsg+0x2f/0x50 [ 736.360804] inet_sendmsg+0x1a1/0x690 [ 736.364616] ? ipip_gro_receive+0x100/0x100 [ 736.368947] ? apparmor_socket_sendmsg+0x29/0x30 [ 736.373713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.379259] ? security_socket_sendmsg+0x94/0xc0 [ 736.384026] ? ipip_gro_receive+0x100/0x100 [ 736.388358] sock_sendmsg+0xd5/0x120 [ 736.392082] sock_write_iter+0x35e/0x5c0 [ 736.396151] ? sock_sendmsg+0x120/0x120 [ 736.400149] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 736.405696] ? iov_iter_init+0xe5/0x210 [ 736.409684] __vfs_write+0x6b8/0x9f0 [ 736.413410] ? kernel_read+0x120/0x120 [ 736.417309] ? apparmor_path_rmdir+0x30/0x30 [ 736.421740] ? apparmor_file_permission+0x24/0x30 [ 736.426599] ? rw_verify_area+0x118/0x360 [ 736.430765] vfs_write+0x1fc/0x560 [ 736.434318] ksys_write+0x101/0x260 [ 736.437961] ? __ia32_sys_read+0xb0/0xb0 [ 736.442034] ? trace_hardirqs_off_caller+0x310/0x310 [ 736.447146] ? do_fast_syscall_32+0x451/0xfb2 [ 736.451654] __ia32_sys_write+0x71/0xb0 [ 736.455645] do_fast_syscall_32+0x34d/0xfb2 [ 736.459992] ? do_int80_syscall_32+0x890/0x890 [ 736.464584] ? entry_SYSENTER_compat+0x68/0x7f [ 736.469180] ? trace_hardirqs_off_caller+0xbb/0x310 [ 736.474205] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 736.479057] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 736.483914] ? trace_hardirqs_on_caller+0x310/0x310 [ 736.488947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.494498] ? prepare_exit_to_usermode+0x291/0x3b0 [ 736.499533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 736.504397] entry_SYSENTER_compat+0x70/0x7f [ 736.508813] RIP: 0023:0xf7f8ba29 [ 736.512186] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 736.531102] RSP: 002b:00000000f5f870cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 736.538832] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000100 23:55:11 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1005) [ 736.546120] RDX: 000000000000ff5a RSI: 0000000000000000 RDI: 0000000000000000 [ 736.553408] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 736.560696] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 736.567979] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:55:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000601, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:11 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) fcntl$getflags(r0, 0x3) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)={0x30, 0x6f, 0x2, {0x3, [{0x48, 0x3, 0x1}, {0x20, 0x0, 0x5}, {0x15, 0x3, 0x2}]}}, 0x30) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000280)={0x96, 0x0, "590a33bf5ceb3af438936282db9b98bf03e640751613e1dc232245327eff42765d8207e1fe80d64d3ec0e731b2cfaea8b912ce6beab1f7fb937dfafa7bdd63a111a4d75802d00a1b33543f468a03ad64b63f0108d84f58dde685e93f5c3ef38a34b3785943a8306abcb88dc9f90e78f128feadb40b4eece1bb528962ccd2c7c36ba2fd60cddf0564f7b37f74452c"}, 0x101000) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000100)={0x2000000000000000, 0x0, 0x7, 0x5, 0x2}) fstat(r1, &(0x7f0000000200)) r2 = getpgrp(0x0) r3 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x181881) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r3, 0x28, 0x6, &(0x7f0000002740)={0x77359400}, 0x8) madvise(&(0x7f0000304000/0x1000)=nil, 0x1000, 0xe) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x23c4, 0x5, 0x1, 0x2, 0x70bd2b, 0x25dfdbfd, {0x2, 0x0, 0x7}, [@typed={0xc0, 0x53, @binary="de947a4f086d9d6978042f15af9cca2890369f90c928ab052947e92c620027e9070c6ddcbb767f03fa077987023439704d612d069c90ff55b62b70306409d3a0cc49e2597541c477be088b8cd7d2e9f0c66b4f43b43eb323463f069accb2abd8522d0605e74ee12a221cdae4e16fd214abe07122f5a4bf994e6fd4499bc091015f8ea3e4bdf1978f9ecab51c81b73d7bcce38de1f830b3a6139cb372a4ab1685f6b6d224608c5924be60e9d58c0b4d7ba613d1f5ca90b181d356f85b"}, @typed={0x4, 0xa}, @generic="d59cb943a6cfec073ea3a47eecd5ca8fb6ed96982b55ff6266307055333680e960edee4c6897d725507ad55237797ec0a4dc15916b4a6c31da4a4fa7ff71e5be32b10b83384e9a7f748cc7cb50f32e5147e535e3800496bd92e6399e5d6644058d65d356d0d6aa1e1da3bc45c00b2954d2fd965b199781b190ddbcb2db3a5fc078001f9fc1f59a4216dcb687a4fbcf1755b904f17b747e207683031129ee177fd3681da84e43975614477afd62c206463e2016606e148b09637803f4", @typed={0x8, 0xd, @u32=0x401}, @generic="3148b017fc94a01cde876439fa00bdc147f0f3b82fafc3e9adf5d42d38dbb201a5e6d314e84a4006dbc64a4e0e39e2ec900e8625b569718cff4a9be1e8957af6eb0e5fff85166d9257a93c04725ef13ac2423561dbc46faa025fd1a4a88efe6ed504c86d4daebd1f331ff07470afb2bcbc8d1a52262ebf4e30df54a12b06162577b2a94c1b82af628bd217", @nested={0x10e0, 0x7a, [@typed={0x8, 0x85, @pid=r2}, @generic="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", @typed={0x14, 0x86, @str='}md5sumcpuset\x00'}, @generic="18d03ca2453701fa47eb758fc603e945b1059a682ff7b67c56b0b8a6ed3733533e1015e2873323d5ee919a374ed4e6e23fd72c7f1aa3f62f4b2a923690a5a6c811af1cb5f68bf8b052dcb710286f1cbc00a6529411152d9538a6593113aa5ca0382c634a0c3d3ec3a4b0af6a9815884bb7e2dcd664df85e56ca80a35120617512cca16c462b0be5b943dfd43cd38feea9c04de1a15d4e31f6387a1d08c885de32d8c654ef55cc35306e5a21f345b9924506bf18a2602461129cc5cb4582599"]}, @typed={0x8, 0x3e, @fd=r1}, @generic="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", @typed={0xb4, 0x7f, @binary="d0af4594805db7f54b5207325e711631e6737d1d70d3602ebe089cd17822f49a588216868d737cbc5daf8f25d18c2096e0c6d836527be1e4eb656cc6b09e17759be270426d14902250d1925c673911664af61109e0d2d9ee3ab11faa6418739bcea9dce3d74d995780b4feea235f6715c97e6719110c4bd17759e20e3494400faaf764849166267fb7dd54ad26ffc8e2d11f0c4c6c454c19e8b5005aca4f9518a0666cf96a3514b41576c80fa018"}]}, 0x23c4}, 0x1, 0x0, 0x0, 0x800}, 0x4001) 23:55:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000240)={'ip6_vti0\x00', 0x2}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x20) r2 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x24002) renameat2(r2, 0x0, r1, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:11 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x106c) 23:55:11 executing program 1: socket$inet(0x2, 0x4000000000000601, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:11 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2f00) 23:55:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8200) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:12 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:12 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1200) 23:55:12 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x600) 23:55:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8200) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:12 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r2, &(0x7f0000000080)='attr/prev\x00') fstat(r1, &(0x7f0000000200)) 23:55:12 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x900) 23:55:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x8000, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000300)={{0xb87f, 0xe6a4, 0x100000001, 0x8}, 'syz0\x00', 0x6}) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r2 = dup(r0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000240)) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xfffffffffffff7ff, 0x6, 0x0, 0x1, 0x1c, 0x8, "928f7431dc0e1740d7f7264165b4d09e909b4e94486cb72f82cba2bdf3f049542d23c164fa8e5757051be9008474cda564568c3071843921db763aef248e6736", "6991650f1157137612c7e64ccfda1aeab7e1212524e2b789b2e2b54d7e616a2dfc2b29dd267a5ce392d368c0826aaf772f06bd7b1c163ee72e5eb101c0f57bb5", "28c8fee410ea3ec48f8a8c777529d44c84d535d60faa98d1991f143075983c79", [0x40, 0x4]}) mount(&(0x7f0000000380)=@sr0='/dev/sr0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='hpfs\x00', 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:12 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1074) 23:55:12 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x5b0) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:13 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x300) 23:55:13 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2001005a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:13 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2000) 23:55:13 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff8) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:14 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100)={0xa, 0x5, 0x1, 0x2}, 0xa) fstat(r0, &(0x7f0000000280)) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000040)) 23:55:14 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002) 23:55:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x3e, &(0x7f0000000240), &(0x7f00000002c0)=0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x5b0) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2001005a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:14 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1048) 23:55:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:14 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1068) 23:55:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:14 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x104c) 23:55:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0xfffffffffffffd08) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:15 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1007) 23:55:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) prctl$PR_GET_FP_MODE(0x2e) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000002c0)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000240)=0x10001, 0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xfffffffffffffdef) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:15 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f00005f9000/0x2000)=nil, 0x2000, 0x1000000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080), 0x84800) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000100)={&(0x7f00000000c0)=[0x24e1], 0x1, 0x9, 0x8, 0x3, 0xffffffff8274be9d, 0x2, {0x1, 0xa2, 0x3, 0xf8ba, 0x100000001, 0x1, 0x4, 0x0, 0x46, 0x6, 0x4, 0x3ff, 0x9a, 0x4, "399b1ea92d1ac0576c239453e69c96c13558f0ef8192baf0d4d1cfe3add98628"}}) fstat(r1, &(0x7f0000000200)) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x22, 0x1, 0x2}, 0x249b}}, 0x18) 23:55:15 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f) 23:55:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:15 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x20000) 23:55:15 executing program 2: r0 = socket$inet(0x2, 0x4000080000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000008c0)="6e6e6100000000080000000000000000000000002748c69839dcb7a2fc059b7ec62fd908a9c38a124cd136435f393e73c4d066302b6c776535ea770ba7f877ea12a7abf9555c1eb9e0605bffae383c1e76ebb62053946280e6f508fdd83383f92d5efe0f5d1a3837a8b778386f4a9159d9634a1458071b8d45c7a083cfa2cdcfa487bebcd4c3aa238a") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000700)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}, [0x14d, 0x10001, 0x2, 0x3, 0x7fffffff, 0x101, 0x7, 0x1, 0x8, 0x2, 0x4, 0xf709, 0x7fffffff, 0x7d2, 0x200]}, &(0x7f0000000540)=0x100) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000800)={r4, @in6={{0xa, 0x4e20, 0x7fffffff, @dev={0xfe, 0x80, [], 0x1a}, 0x8001}}}, 0xffffffffffffffbf) r5 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x3, 0x400) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000380), &(0x7f00000003c0)=0x4) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000580)="71427961d08efa2bf61f7566d161f2d386e4316d8e1ebf2dac7324ee667a93c12d6e79d9a535922ac273af06a5406bf3c1504b62ef69a8285dd220bcf131c9e673620e3155a1136920dcdd70dcf633820980861589b42b6e1b8b92fe3204f6098cca964f21c8fc67b85223a5f0cdcfccbcb7d7e2fb2ba569fbb655b517d4918010225d3e3a23f9ca396db29dce6954abc2e573c70c5733bb01de3120ef38199d12a0413e73f33f3f2db5cd", 0x4f) r6 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) openat$vhci(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhci\x00', 0x4000, 0x0) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r6) 23:55:15 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xe00) 23:55:15 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x700) 23:55:15 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1006) 23:55:16 executing program 0: r0 = socket$inet(0x2, 0xffffffffffffffff, 0xfffffffb) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) acct(&(0x7f0000000240)='./file0\x00') setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000300)={0x0, 0x3f, "ac9cd15cf814fe090f57ce7fd61bbaf30357bdcb5eabc56e26170e203d15cd39eed7903140b0b450256abd75aedd0f3cd8e1fae3461f84543ffb18bf52903f"}, &(0x7f0000000380)=0x47) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000003c0)={r2, 0x7, 0x3, 0x4}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:16 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1018) 23:55:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], &(0x7f00000017c0)=0x6) 23:55:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xfffffdef) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:16 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x78) 23:55:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, 0x0, 0xffffffffffffff3a) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000380)) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) 23:55:16 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x50) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000180)) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000080)) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0186404, &(0x7f0000000040)={&(0x7f0000294000/0x200000)=nil, 0x1, 0x5, 0x14, &(0x7f0000349000/0x4000)=nil, 0x6}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc004240a, &(0x7f0000000340)={0x3, 0x0, [0x0, 0x0, 0x0]}) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r1, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004080}, 0x40085) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x48fd) 23:55:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:17 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd00) 23:55:17 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1078) 23:55:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:17 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4c46) 23:55:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = memfd_create(&(0x7f0000000240)='\x00', 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f00000002c0)={0x31ceb32500000, [0x1f, 0x70b, 0xde46, 0x7fffffff, 0x2, 0x8, 0xb8ea, 0x7, 0x7000, 0x5, 0x8, 0x6, 0x17ca, 0x4, 0xca, 0x8f, 0x40, 0x8, 0xb8dd, 0xfc, 0x5, 0x0, 0xa4ea, 0xff, 0xfff, 0x2, 0x3, 0xfffffffffffffff9, 0x1ff, 0x3f, 0x6, 0x9, 0x8, 0x8, 0x401, 0x8001, 0xfff, 0x5, 0x9, 0x800, 0x40, 0xffffffffffff0001, 0x1, 0x3f, 0x0, 0x7, 0x3, 0xff], 0xf}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xfdef) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:17 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 23:55:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 743.588200] syz-executor4 (30743) used greatest stack depth: 12712 bytes left 23:55:18 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004) 23:55:18 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000380)="2576626f786e6574305e5c25232470707030f10d2f00"}, 0x30) ptrace$getregset(0x4204, r1, 0x6, &(0x7f0000000440)={&(0x7f0000000400)}) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0x80000da9, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000280)) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r3) 23:55:18 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x107a) 23:55:18 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x5) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x113, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r2, 0x0, 0x2, 0x4}}, 0x20) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x7) mmap(&(0x7f0000687000/0x2000)=nil, 0x2000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000000c0)) socket$inet_dccp(0x2, 0x6, 0x0) 23:55:18 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4000) 23:55:18 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000000280), 0x1000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:55:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000580)={0x0, 0x35}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000600)={r2, 0x6}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x100000000}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000380)={r3, 0xb8, "e141d4bf43afcedd9f1a2df40cbc4edc121677ea66b985a6c2a16da68de0ac48ed1c99482a2b19ab4b8d005b734cc16e6a392dd3d77b9f58609480c6783cf3ebeae6a09f9aebf6f8fbb3d61fd3f3915eb407d86173ee63a692db8e9b8f29ba3d5c6e39803cee566df00f1f67ea2fcec85c628dc7d203c1aba2a4bbdca73364a78b1a1dec72d56f34fd1566b2e034fe793d692b8ce74f783e1df734cd0473b525d100d8138740921cf5144acc189d6c3215ae1233b2911edb"}, &(0x7f0000000440)=0xc0) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6f) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000017c0)=0x6) 23:55:18 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x500) 23:55:18 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x85b0) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:18 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xb00) 23:55:19 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1003) 23:55:19 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000080)={0x1, 0x0, 0x71a0d6f2}) 23:55:19 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e22, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x1a3) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)="0078f126", 0xfffffffffffffe04) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x4, 0x480200) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000380)={0x3}) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r1, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) unlink(&(0x7f0000000180)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r3) 23:55:19 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x90, 0x200, 0x2, 0x200, 0x0, 0xc277, 0x80, 0x2, 0x1000, 0x7fff, 0x3, 0x8, 0x8, 0x7fffffff, 0xeaed, 0x3, 0x7ff, 0x7, 0x8, 0x6, 0x7fff, 0x4, 0x800, 0x4, 0x80000000, 0x100, 0x1, 0x27f1, 0x2, 0x1, 0x5, 0x101, 0xc2, 0x28b, 0x5d50a08, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x4000, 0xffffffff80000001}, 0x62, 0x0, 0x6000000000000000, 0x9, 0x3, 0x3, 0x10001}, 0xffffffffffffffff, 0x0, r0, 0x9) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x7f, 0x4) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:19 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000000c0)=0x17, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)="00000000009d55e67a00", 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000040)={0x3, 0x6, 0x4, 0x7}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) r2 = geteuid() sendmsg$nl_generic(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x17, 0x600, 0x70bd2a, 0x25dfdbfd, {0x1f}, [@typed={0x8, 0x6e, @uid=r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:19 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x1ff, 0x4fe, 0x7fff, 0x4, 0x5, 0x86}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'vcan0\x00', 0x400}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{0x0, 0x2710}, {0x77359400}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000300)) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0e05403, &(0x7f00000000c0)={{0xffffffffffffffff, 0x2, 0x1, 0x2, 0x7f}, 0x7, 0x0, 'id0\x00', 'timer1\x00', 0x0, 0x2, 0x1f, 0x800}) 23:55:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0xffffffffffffff08) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000380)='ns/user\x00') sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) fcntl$dupfd(r2, 0x0, r2) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$BLKRRPART(r2, 0x125f, 0x0) r4 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r4) sync_file_range(r3, 0x0, 0x6, 0x1) 23:55:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x200281, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f00000002c0)={0x0, @reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:19 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x100) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000100), &(0x7f00000001c0)="08618cf7ff43e0ec5dfb6b2c95422d1e7950cd4a163d99c213a3a2d019b8b4b2fddea73429f4662cc4cd3e29943e03afcf58831e475a4a92712a670b755e4d3db1ca34d67cf84fb4369dc0685e41f2c065d798049457f12b2b3451128241469fb719255c7a58bc194fb1dc380800e00e296d14f4cb2a0204872c3dc9300f8b9ddcdd5b88f5afcb2dbe01dd15fc9f97b2f86102a00e73c7515c9515c041855367682201e0ac093d010489c2e050"}, 0x20) 23:55:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3ff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000240)={r0, r0, 0x2, 0x1, &(0x7f0000000140)="64ea562035", 0x8b0000, 0xffffffff00000000, 0x6, 0x6, 0x5, 0x800, 0x8, "91222d792e27bddb4271971f2ad3caa12f830ae5393f16818d00fe142ff565ab3a9863fb6f23bcdb2b0ba8983e693a2cb2b4b3edb8380c25effa01614d94c874150a600f00969403f8b82480b648bfa06cd36043a52819740b60a8a07da44eb1aa1b053a6304e47e98608734f7b442bbaca8520af2ebeafe07eb28193d1878bffd4de39bdba5521d7c37ed2141e63afcc303a814b9b8"}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:20 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 23:55:20 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@loopback, @in=@remote}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff00000000000c734d4762709d5eab490a9046183fc380f4b90020000200000000020000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000100000072809a0d356069a889d0dece44af334260ff47eb7c6005e4e8ce0000000000"], 0x78) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004) mkdir(&(0x7f0000000100)='./file0\x00', 0x2) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000380), 0x8) 23:55:20 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setparam(r0, &(0x7f0000000040)=0x9) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f00000001c0)={r2, 0x10}) 23:55:20 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:20 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) setsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f00000001c0)="e2b39c1084bd004837b13ea567a65102597b092148cd9f5dfe2a7c3c91813c21f0858e0b2adfb1b5643a121dae8abedb6aaf3024d1302f48dac8f41399d2bdf295fa93c0368ce1fa2e99eabf119971a869df073c58a4fe6c6204cf17ba2936f4746c9bcd5d2fd19389b18040c3dac46311dcec5a9d3c3bdcd3c4a9dd77cad2cc6ca62ba3f59a6254d619958c7d990d162ea78ecd036b795bf1d1da93817d3a139bcffce5a82da09c1d9f1e8937e9b4f49e9242560c6d30456a3971298bd929814c5e5d955a8fa9b39c52a92e427b4fb9", 0xd0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:20 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) 23:55:20 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff7, 0x80800) ioctl$NBD_DISCONNECT(r0, 0xab08) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600004000000000000000000003000614404b7a000000000039000000ffffffff00000000000020000200000000020000000000000000000000000080000000000000000000000000000000000000000003000000000000000000ce2d50a825000000000000026d2c88f47cc139767598046d8db800"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:20 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) prctl$PR_SET_UNALIGN(0x6, 0x3) 23:55:20 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x6, 0x200000) sendto$inet(r0, &(0x7f0000000580)="ca8a6093662464c92cc5e147b7ece760e27df28e0327b4065047614aab9275bd26293160be920ed068c2cdd91e1f7fb5f55404880f3e914eb142295cb429ab2c441160216bd632d035bd07993ae0dc6a6bd98e4dae00684a44b059a6c95b00c31420a46500cf22cf576be411e6b0f752bdce3ce5b59a77db56206828d7d1f64255016380dd85710f0785938c58ee059fac51fe615b1041d1d9d80ebaa4bcf3600dd3dbc5eca218ee082d44fe660e3db01f64689b83f74e51f19f11385f4adf64a61b7dcc8b2c0df520fdd0bb6fe58a7e5f205039d5c6db4ad2727fd84d75781e5ca8f675515f9b382d10fc2689995f8070b9854f57dc16343d", 0xf9, 0x8050, &(0x7f0000000680)={0x2, 0x4e23, @rand_addr=0x40}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x9, 0x220000) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f00000006c0)=""/166) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000280)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000480)=0x0) ptrace$pokeuser(0x6, r4, 0x5, 0x4) r5 = request_key(&(0x7f0000000800)='big_key\x00', &(0x7f0000000840)={'syz', 0x1}, &(0x7f0000000880)='\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000300)='logon\x00', &(0x7f00000007c0)={'syz', 0x2}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r6) add_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0x0) r8 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000780)={'syz', 0x0}, &(0x7f0000000340)="ff8390ce39", 0xe6d4, r7) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r8) 23:55:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) r2 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() fsetxattr$system_posix_acl(r1, &(0x7f00000003c0)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x6}, [{0x2, 0x5, r2}], {0x4, 0x2}, [{0x8, 0x2, r3}, {0x8, 0x6, r4}, {0x8, 0x1, r5}], {0x10, 0x2}, {0x20, 0x3}}, 0x44, 0x3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) ioctl$VIDIOC_G_FBUF(r1, 0x802c560a, &(0x7f0000000240)={0x24, 0x40, &(0x7f00000002c0)="137cf62bf66bd614db40c1264b668b1f8987b24bbdb6a427ef14e7c60cdce94f9ab82dcab5baad76074a699d30ae52b2f560816807f10833aaa001a67368f254287fc5a1905edbb8ab9bd984971375256eb914535778452c7d96186914c459dc849f16fa9f0ced0c671bbef6577080672b86510d2a6f7db0bfa09a604762bb2cd508fcce22fc8163b4966fb2604106fa09f3e7f6cf5068b9f67b301a4292dab4b5a20a6262cf10d9b74c5bcf84958b08caf7ac76caf74b1ef9de5d2ca1c964daadf54cfb47a3bce1cb07639f3f3179b1d74949681466d7abe76df0db74f1bcb4967354f7575ee6e3f760837c142e77", {0x4092, 0x5, 0x20385655, 0x2, 0x7f, 0x6, 0xb, 0x100000001}}) 23:55:20 executing program 5: clone(0x2102001bfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) getsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040), &(0x7f00000000c0)=0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt(r0, 0x6, 0x9, &(0x7f00000002c0)="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", 0x1000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0), &(0x7f00000012c0)=0x4) bind$unix(r2, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) personality(0xc100001) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000001380)={0x8003, 0x5, 0x301f, 0x1}) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:20 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000001c0)="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") syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') 23:55:21 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0x9, 0xfffffffffffffffa]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f00007b1000/0x1000)=nil}) fstat(r1, &(0x7f0000000200)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0xc0400, 0x0) 23:55:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000004, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) fcntl$setsig(r0, 0xa, 0x35) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:21 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040)=0x3, 0x1) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:21 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)="ccba76a0", 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f00000000c0)=@generic={0x2, "5f39bc615f82e54924d8ffa199c6a53cd61aaf273dd4eee8ec923a7cd9a3618f67ce8cbefc3944e200b22e7e71f40864cf5ad9746f582ed3922075d7df9d47bd165f75bad6f1cb1ac0524d683c9013468c9e5d0f707048b0aefbffdbda2c8bfcf93c5fe4506d8f3a9a25c95e589596e9fa49e0e35b7944ca8880aa7ca9e4"}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="aaa5c906350e9f4329e52a312993331297b316b79ad8180292b5d27c7d2823554cee71882a87225740fd2785d8e1e02c782f5caacd6c9eff1698f44d016ebb5fa85964674f5c53285c7bca76c5b25f3daad6a5635d834298624738fa65e53622b5cbfd3d2d5738370be6e1fcd332b99bcf3863b8838fdcc8b097b981", 0x7c}, {&(0x7f0000000240)="2722e3dfb1331598264c5997d4c5b1e75f9d2f509c475369e9ae596f51563e96ab76ff596b79465207413f4020377fa5b1bf61b3cd9f39962aa2acb7d386314e2c8ed6135b4818", 0x47}, {&(0x7f00000002c0)="76813ea50fc88ed3cfefe65a4099f70074a6a93b60b94871c7cc7ae0bc90eae42ad122b11fd8305ccf8e6ed50614c8a6ac922ffc4f021c6cb4ff3ad1b5addf07018d351ba16aaf13d8844d7cafb132f6c461e4031bfb77dfe9c9625dc29a5da2a018bea2af65e5f5d8bd92530214a058556ae7bb1ef53fc014cc438e5a49", 0x7e}, {&(0x7f0000000340)="edcc1fdf851ed2a12142c1284cc82902cb34288cebb5be07e0d4c8c2c34f3b9b4a1263ee2000fb570c697ee12f12682b8dfa8e153db3a9a531cd2e145f67866934994c67a5101e5caa48889b389e7a2a1adca64a5b574745e94cc376d286d7d5a5f86ed7230ada4f5b34024cdb6bbbed694ded0fc85e9d144d38015890561f526c7eef26ee528c4e63980e18c27b12a5c4af9ddfcb2aee55b5380b323f3a90c719e380550fe18545b5b56672f70cc3888c618a80ac962d9614706e8834923a9bb5f7ff5729778bc5e3d3cdf22b85bea4494a4b7a16258604a39f0ecefd196f87d7a870a2790ae84f327a1059c27538cf2b14b8de0e4a366268f72c79cc72f8", 0xff}, {&(0x7f0000000440)="e204ffd99a395896cb0f05c6d33d1f2b59e55c30c39ca85750606c75ad5333f5c85b9e8368d4bf7bace1c555040d17c73a87446def6ce036f1a0386f108fb166dc6f41b5e3054fff39cd1376007bb6360708c74d", 0x54}, {&(0x7f00000004c0)="f9a4dcc3941944a0df8f0587062eeca846cf060e34ce10cf0adda5fad9d6d78c898b3a84e6529de93c7fa7ab989700ccd0c8dd2040edd9d46dea374d10366c0097ada73e0ed4a97a8a60853e685a3ff1fc8c741cee94ff196f22170186e0dfb02efbb97a384c03a8c3e02f316bf8e163b3aa04b3d73ef16e3c284d83b84d9f202cebb782aafb40e3ee591409e9f475ebfedfa7c5fe8e1530130829eaead2b4ca1236a043a6a009f2dd33900f6b1ac5d03efd4041721f8b1de8a3e5216c8d9a742a4c79", 0xc3}], 0x6, 0x0, 0x0, 0x4000000}, 0x20044000) 23:55:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) 23:55:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) inotify_init1(0x80800) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x80000000, 0x1, 0x9, 0x4, 0x0, 0x7, 0x28000, 0x2, 0xfffffffffffffffa, 0x0, 0x3, 0xff, 0x6, 0x0, 0x5, 0x1, 0x0, 0x1ff, 0x8, 0x1, 0x3, 0x80000001, 0x81, 0x9, 0x7, 0x10000, 0x4, 0xfff, 0x101, 0x4, 0x8, 0x8, 0x9, 0x4, 0x7ff, 0x3, 0x0, 0x8000, 0x4, @perf_config_ext={0x6, 0x9}, 0x10000, 0x4, 0x7, 0x9, 0x7, 0x7, 0x6}, 0x0, 0xe, r1, 0x8) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000280), &(0x7f0000000380)=0x4) 23:55:21 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x402, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r1, 0xed56}, 0x8) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000200)={0x3, 0x401, 0xffffffff, 0x800, r2}) write$binfmt_elf32(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:21 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)="3d00d27c0dd4831c3fcc5cac31716d411c78feadb111aabeb5e3e91b74ace7f8f3031c02eab7a8d989cebbce9fac467600bc77382132849885eaa39baea32bac05783980b1cf5a7184ab493c234615ed5f49caaa9419a1bb72bdea3697e315e68e665240cbda41240afe241ace8a6d53cee86c57e8e05cba3d6b9562111932aba32a5e7dc34573e794723e5b8cc706c7f99e452260587a299cdeb2ed31da5966f67a5ffddace15265cc20b7256895bbc8194c9049244d52d00", 0x1) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46000000000000000038000000ff00000000200086000002000200000000000000000000000000000000000000000000000412000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000b48932e545b939ee8620d4bbdd85ae438cb5725ffaf4c339f888474521dbd53c13b27bd6243525b55096d3a98ece7f459d806ce8e4fa541e00000000000000000000000000"], 0x78) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x1879, 0xe, 0x7}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x9) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0xce5, 0x9bef, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/userio\x00', 0x440000, 0x0) io_setup(0x8, &(0x7f0000000440)=0x0) recvmsg(r0, &(0x7f0000000a00)={&(0x7f0000000540)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000380)=[{&(0x7f00000005c0)=""/85, 0x55}, {&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/116, 0x74}, {&(0x7f0000000840)=""/193, 0xc1}, {&(0x7f0000000940)=""/111, 0x6f}], 0x6, &(0x7f00000009c0)=""/47, 0x2f, 0x3}, 0x40000120) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000a40)={0x0, 0x181}, &(0x7f0000000a80)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000ac0)={0x7, 0x200, 0x80, 0xff, r2}, &(0x7f0000000b00)=0x10) io_destroy(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) r3 = accept4(r0, 0x0, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000480)=ANY=[@ANYRES32=r4, @ANYBLOB="4d0000004ad549edcad3e6528c47922f2b5271251f1ba132b8e388d2ca77d838d2c7ba2b07a9ae9e4e4b270f11d49aecdbb7a0c6eab7cc75270b7d7abd781572f935e40383a39cb303bab90597fb874ac09987afaa3a5eae31ce42aef0939e92cf7fb870a3280c08cdf39d20470c47c0fb368c98940d38cdc687837a69abfac9645286dcd37278afc7f18b59256420ac613b1e51138ea6240029d98fe3442b07b829e2b6f76c8715"], &(0x7f00000003c0)=0x55) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, r5, 0xb}, 0x14) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:22 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000280)=[0xee00, 0x0, 0xee01, 0x0, 0xffffffffffffffff]) lchown(&(0x7f0000000180)='./file0\x00', r1, r2) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=0x0], 0x14) execveat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x1100) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000100)={r3, r4/1000+30000}, 0x8) 23:55:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:22 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4018641b, &(0x7f0000000040)={&(0x7f0000a6a000/0x1000)=nil, 0x3d00000000000, 0x4, 0x20, &(0x7f00005a7000/0x4000)=nil, 0x101}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:55:22 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000010000002000000080000000000000000000000075036cd3eb2b6fc4a0be3114576a33a90e1a2d01a32c892ef11cb64e126c53dd4d3374fdaf46e30593aedcf556a87458c98d37eee9c47fb0b87d4246a201fedebdd1b95b730917bca1c3cf5f5c4ea1e0be3913cdcc3e6199a6541d0af4d675e60ea4573286293313c0e348caf5a6dc3f4"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x40000) 23:55:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0x3f5) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x5, 0x20, &(0x7f0000000000)) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x0, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000340)={0x14, 0x13, 0x6, {0x10, 0x0, 0x5}}, 0x14) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x7, 0x64540) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f00000002c0)=[0xffffffff, 0x100]) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000380)) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000003c0)=0x77, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x8000000000000000) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000140)={'yam0\x00', 0xad9}) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000280)=0xa86d) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) 23:55:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:22 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x1, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e23, @broadcast}, 0x283, 0x5, 0x4, 0x0, 0x37e, 0x0, 0x6, 0x6, 0x1}) 23:55:22 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000800"], 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000040)='\'\x00'}, 0x30) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0xc35d, 0x1000, 0x4a65, 0x537, 0x0, 0x6, 0x10010, 0xa, 0x5, 0xfce4, 0x8000, 0x3797, 0xeb, 0xfff, 0x81, 0x8000, 0x4, 0x9e, 0x3, 0x7, 0x81, 0x8000, 0x488b251c, 0x7, 0x3, 0x8, 0x1, 0x1000, 0xfffffffffffffee0, 0x1ff, 0x9, 0x3f, 0x7bf, 0x7f, 0x0, 0x8, 0x0, 0xf9f, 0x1, @perf_config_ext={0x2, 0x7}, 0x23201, 0x8, 0x1ff, 0xf, 0x3, 0x0, 0x7fff}, r1, 0x6, r0, 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:23 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000180)={0x2, 0x6, 0x5f, 0x40, 0x9, 0x20}) r1 = request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='\x00', r1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000602000000000000000038000000ffffffff0000000000002000020000000002000000000000ee000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000fdc1ad1aff88a8d2fa13925805d8beba809173270560a5ec35"], 0x78) ioctl(r2, 0x100, &(0x7f00000001c0)="fa5d0d8a6c55ae99b6e347ef1880a7f1f1a9faa5475f060973725fc36423046f3dc5d375d72ccd5bbdff61bc32a19abf97cebc7d8ed3035555c0b173ff6bf31e9e08365bf80eb46693106c2931f767d7cebced441e5abc20cadb7123e7b74315b54fc95e762593efbc521a52c1254c3f81977e261f3273a2b82836272338fe6cf389b1244913256bc3a6b10dc78c7e3de9f1e419107dc46b043e231a3c2b8e4a5dbf3c23039d907b130cb7ddf0b62f6d51a30ff429b0153ca04255c9f204c3fba5b63a0bf9c53b76b730a4c265afd0") execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:23 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x20000) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000100)=r1) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:23 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0xb6fd004fb33e94e4, @loopback, 0x4e24, 0x1, 'none\x00', 0x8, 0x4e44715b, 0x29}, 0x2c) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) write$P9_RREAD(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="750000007502006a000000c8d8dfa4d14a22a07f91073f50e790aad0c243e6bb493bdf9d071edb63969277734835657741f8f4c29594a078d2306e55688d9341990ef1f9190a9b4307ad628e37740f0978973f97803fb786f68877c5897e34df8485339bc81eedc536120358c6ec3eae7ce64ae12e"], 0x75) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) 23:55:23 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000323000/0x2000)=nil, 0x2000, 0x800000003, 0x803e, r0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x709d, 0x4) fstat(r1, &(0x7f0000000200)) 23:55:23 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x4201, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000100)) r3 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') clock_getres(0x7, &(0x7f0000000300)) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x300}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0xf24, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}]}, 0x1c}}, 0x91) 23:55:23 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+', 0x200000000000200}, 0xffffffffffffffc1, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:24 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xc) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:55:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x5, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r1, 0x5c, &(0x7f0000000240)=[@in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e24, 0x8, @loopback}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e20}]}, &(0x7f00000002c0)=0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:24 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000400000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 23:55:24 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffffffffffffffc) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x2, 0x401, 0xbe, 0x1, 0x953}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={r1, 0x0, &(0x7f0000000100)}, &(0x7f0000000380)=0xc) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r0, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0xd, 0x8000) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000140)={{0xff, 0x9}, 0x2}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYRESOCT=r0, @ANYRES16=0x0], 0x39f) epoll_pwait(r2, &(0x7f0000000100)=[{}, {}], 0x2, 0x4, &(0x7f00000003c0)={0x40}, 0x8) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:24 executing program 0: r0 = socket$inet(0x2, 0x4000000020000004, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000080000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000240)=0x0) write$P9_RGETLOCK(r2, &(0x7f00000002c0)={0x34, 0x37, 0x1, {0x2, 0x8, 0x4, r3, 0x16, 'trusted.overlay.nlink\x00'}}, 0x34) 23:55:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(r1, 0x1ff, 0x100) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x4400, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000340)={0x2, [0xffffffffffffff01, 0xd9]}, &(0x7f0000000380)=0x8) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:25 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="4a8a84c1aa123ff9c1137b2f08696d3224af151c12687cd2e47fc37ace3915", 0x1f, 0xfffffffffffffffa) syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x40, 0x1) r2 = add_key(&(0x7f00000002c0)='syzkaller\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="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", 0xfa, 0xfffffffffffffff9) keyctl$reject(0x13, r1, 0xb6d, 0x0, r2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x8000) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f0000000140)={0x0, 0x47504a4d, 0x3, @stepwise={0xcd, 0xc3, 0x80000001, 0x7, 0x8, 0x3f}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:25 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:55:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000005, &(0x7f0000000400)=0x74, 0x2) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0185648, &(0x7f0000000580)={0xbe0000, 0x4, 0x8, [], &(0x7f0000000540)={0x990a79, 0x1f, [], @value64=0xdad}}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f00000003c0)={0x20, 0x28, 0x2, 0x15, 0x9, 0x1, 0x0, 0x63, 0x1}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000005c0)) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) r4 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x800, 0x2) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000440)={0x1, 0x58ea}) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r5 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f00000004c0)="73aa256b616c6c657200", &(0x7f0000000640)={'syz', 0x2}, 0x0, r5) ioctl$SG_GET_REQUEST_TABLE(r4, 0x2286, &(0x7f0000000680)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) 23:55:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x121000, 0x0) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000380)={0x5, 0x103, 0x1, {0x1b2, 0x6, 0x8a30, 0x6}}) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x8, 0x4000) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:25 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:26 executing program 5: remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x9, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000000c0)={@dev, 0x0}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x1, 0x70bd26, 0x25dfdbfc, {0x0, r1, {0x7, 0xa}, {0x5}, {0x4, 0xfff3}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000081}, 0x10) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:26 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x9) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0xffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:55:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000266aafda38c58d88b5beff2424a9bb64726149833a5310d745bff87a4988ea9d0fb3e460ddc88bab41cb4fe102d4fc960f4be5e1f1d85df3fb000000"], &(0x7f00000017c0)=0x6) 23:55:26 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='bbr\x00', 0x832513f9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001440)='/dev/audio\x00', 0x121400, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r2 = add_key$keyring(&(0x7f00000013c0)='keyring\x00', &(0x7f0000001400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="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", 0x1000, r2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r3) 23:55:26 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 752.371686] IPVS: ftp: loaded support on port[0] = 21 23:55:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000fcff3a2530c8996744d984f7c24592072fa92e6961"], &(0x7f00000017c0)=0x6) getsockname$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev}, &(0x7f00000002c0)=0x1c) 23:55:27 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) fadvise64(r0, 0x0, 0x6, 0x4) 23:55:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='syz', 0xfffffffffffffffb) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x4000, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000440)={0x7, 0x21, 0x2}, 0x7) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) 23:55:27 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x9) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000002a80)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x3, &(0x7f0000000100), 0xfffffffffffffe7a) recvmmsg(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f0000000140)=""/55, 0x37, 0x8}, 0x4}, {{&(0x7f0000001240)=@l2, 0x80, &(0x7f0000001380)=[{&(0x7f00000001c0)=""/29, 0x1d}, {&(0x7f00000012c0)=""/24, 0x18}, {&(0x7f0000001300)=""/98, 0x62}], 0x3, &(0x7f00000013c0)=""/138, 0x8a, 0x1}, 0xfb65}, {{&(0x7f0000001480)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001940)=[{&(0x7f0000001500)=""/99, 0x63}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/239, 0xef}, {&(0x7f0000001700)=""/183, 0xb7}, {&(0x7f00000017c0)=""/156, 0x9c}, {&(0x7f0000001880)=""/130, 0x82}], 0x6, 0x0, 0x0, 0x81}, 0x7}, {{&(0x7f0000001980)=@nl, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001a00)=""/48, 0x30}, {&(0x7f0000001a40)=""/49, 0x31}, {&(0x7f0000001a80)=""/238, 0xee}, {&(0x7f0000001b80)=""/18, 0x12}, {&(0x7f0000001bc0)=""/114, 0x72}], 0x5, &(0x7f0000001c80)=""/253, 0xfd, 0x4}, 0x8}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001d80)=""/214, 0xd6}], 0x1, &(0x7f0000001ec0)=""/23, 0x17, 0x8}}, {{&(0x7f0000001f00)=@ipx, 0x80, &(0x7f0000002440)=[{&(0x7f0000001f80)=""/100, 0x64}, {&(0x7f0000002000)=""/42, 0x2a}, {&(0x7f0000002040)=""/253, 0xfd}, {&(0x7f0000002140)=""/148, 0x94}, {&(0x7f0000002200)=""/2, 0x2}, {&(0x7f0000002240)=""/195, 0xc3}, {&(0x7f0000002340)=""/193, 0xc1}], 0x7, &(0x7f0000002480)=""/34, 0x22}, 0xffff}, {{&(0x7f00000024c0)=@rc, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002540)=""/8, 0x8}, {&(0x7f0000002580)=""/156, 0x9c}, {&(0x7f0000002640)=""/157, 0x9d}, {&(0x7f0000002700)=""/170, 0xaa}], 0x4, &(0x7f0000002800)=""/93, 0x5d, 0x1}, 0x1f}], 0x7, 0x1, &(0x7f0000002980)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000002b80)=ANY=[@ANYRES32=r1, @ANYRESDEC=r2], 0x18) socketpair(0xf, 0x2, 0xb, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f0000002ac0)={0x3f, {{0x2, 0x4e23, @multicast1}}}, 0x84) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000002a00)={0x6, 0x6000}) ioctl$PPPIOCGFLAGS(r3, 0x8004745a, &(0x7f0000002a40)) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:28 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5473, &(0x7f0000000040)=0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r2 = dup2(r1, r1) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000200)=0x1ff) request_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='vboxnet0selinux:wlan0cpuset\x00', 0xfffffffffffffffa) r3 = add_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="82f3f806227554efac1a0c176a0fe3e33f8820212072765862456c8a8fbc4eaee20cee2f2679df47a35c821325640353181165a98cbec648030970b038680a5f764baee3df6a07ba3d5126bd27e8c32a8ddbac08fb9cc8fbbfbf5fba15f6052e8d431fe04762239ce96617b228af44c648052b8cff924f3a5e54942332cb7b2366c9b474ba939fa36731b92d034b6cc0b4beca25a700876bf5347ae117acea86131667456cf176656d26044a10388160b62d68907d0b1b2b6fc432a75252173d354f77d737", 0xc5, 0xfffffffffffffff9) request_key(&(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, r3) [ 755.298320] device bridge_slave_1 left promiscuous mode [ 755.304538] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.348673] device bridge_slave_0 left promiscuous mode [ 755.354138] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.564104] team0 (unregistering): Port device team_slave_1 removed [ 757.574457] team0 (unregistering): Port device team_slave_0 removed [ 757.585478] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 757.612869] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 757.679299] bond0 (unregistering): Released all slaves [ 757.761415] bridge0: port 1(bridge_slave_0) entered blocking state [ 757.767956] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.775047] device bridge_slave_0 entered promiscuous mode [ 757.808216] bridge0: port 2(bridge_slave_1) entered blocking state [ 757.814641] bridge0: port 2(bridge_slave_1) entered disabled state [ 757.822656] device bridge_slave_1 entered promiscuous mode [ 757.870571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 757.919293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 758.065485] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 758.116502] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 758.351112] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 758.359109] team0: Port device team_slave_0 added [ 758.407266] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 758.414821] team0: Port device team_slave_1 added [ 758.464283] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 758.517019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 758.569178] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 758.576359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 758.594567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 758.635117] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 758.642381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 758.660560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 759.137055] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.143510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 759.150266] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.156653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 759.164673] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 759.757911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 760.313134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 760.412933] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 760.512298] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 760.518550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 760.525589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 760.626142] 8021q: adding VLAN 0 to HW filter on device team0 23:55:35 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0x2, 0x1}, {0x80, 0x400}], r1}, 0x18, 0x1) 23:55:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x5, 0x40200) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000340)=r0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="01000000fcff433448a010fafab0a4c2eef7fc816bfe1d7de0cf0c8c80457fba4be346497300f4f450c0a0b62a8c38b12aee49855cc756d2db232bc758e9db4cd2532e2fbfe7804a8b7c87f0a9a405805f6a5a54618e9bf443c92adff28961c11c224f1055421302df08ff36971270ff1257543730e28e"], &(0x7f00000017c0)=0x6) 23:55:35 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f00000000c0)=0x7ff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000040)) 23:55:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:35 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 23:55:35 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x0, @multicast2, 0x4e20, 0x4, 'ovf\x00', 0x4, 0x1, 0x52}, 0x2c) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/autofs\x00', 0x2000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000005c0)={r0}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x7fff, 0x200000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000001c0)={0x90000000}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) [ 761.331670] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20000 23:55:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x10100, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000140)={0x40, "bd9b67a1851c830d22d546e4aeda8bdfbe657b5adcfea8a1a7cdc7d2aa3ce226", 0x3, 0x28, 0x40, 0x280000000000000, 0x0, 0x3, 0x6, 0x7e45}) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000e7000000000000000000040800000000000000000000000000030000000000000000000002000000080000000000180000000000c90d0ed8249217df77d333b682044c93d93924dd641c71150fc8456e745da4a18a881f697e2a3aa6e4db162e9db1a123ca104360822df8a596d5b83e37e5ebedb8e612f3a9da86737855e21682a8b80cdd226390670e5313b83a6399adbf51ee95a5d77ca19ef2f2cc63f1f876c3efddf9d4cb6bb86f3bfab68eb44df3dffc5390c1fbe0d8c2a17a08f26b988391ba67e198878e88797391daa60336999233f101b4ac5bbd0b16839b88e1d160835fff8ff638307725a399eb"], 0x78) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x7fffffff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r2, &(0x7f0000000280)=0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400001000) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000000c0)={0x6, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x4e23, @rand_addr=0x2cb}, 0x2a4, 0x3ff, 0x6, 0x1000, 0xfa17, 0x0, 0x3, 0x8000, 0x4}) [ 761.536518] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20000 23:55:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x20000) mq_timedreceive(r0, &(0x7f00000000c0)=""/137, 0x89, 0x8001, &(0x7f0000000180)) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000001c0)=ANY=[@ANYPTR, @ANYRES64=r1, @ANYPTR64, @ANYBLOB="df524c362b9e266463dd848cb34efe0b0853ce649d2a743ceaa3de75da861b2119e52b9fe0cfbc8e26a1d4ebf2f11ba73c2fd3dbd6733f3829c4cd6d3373a5a7353a25a11c54949162d558159e4adce6d5a3806632105c079e6033b52e668103570eb7a7", @ANYBLOB="5d3159a5d65472480430652f40dc971158e01017ca2df1de8357762d12bd29145a7ecf40eeee92ea79ea8f5f4668cf731511e63595e26defb832efba4f1f2f35557dcd23153e242e16d7"], 0xc2) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) sched_setscheduler(r0, 0x2, &(0x7f0000000240)=0x4) r1 = memfd_create(&(0x7f0000000040)="dc6d696d655f7479706500", 0x0) setsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f00000000c0)="144e34e8979e894387e7a0ce3206794da40448c6caedc3968b072888cd7669c4c446604b346983494eb59f9125d7dc86727159eac52ebd343f0275fe178ecd46ae968e396284fb2e62482e58163dfb0a4c0cc4d535b8de892fd3bdb9c682e8b152", 0x61) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0x2) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:36 executing program 0: r0 = socket$inet(0x2, 0x1000407, 0x800000000002) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) sched_getaffinity(r2, 0x8, &(0x7f00000002c0)) 23:55:36 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) 23:55:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) socket$inet(0x2, 0x5, 0x10000) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000380)="73797a6b616c6c677200758a2fb16467041350a0b4ad3626efb7421036b710cdb1bc7bbbc862546f94df414567838fcd45de03618358fcb7e18c34b0c27a2225134bdb17014fafc36302dc0eb324ce895fb2ad8b9faf915daa178a522031e5ebbb7bcdb51be3675a81f630a5583c0150f4545da68209fa073a9205dc01a38854328f60a127e47e3d4698836a880edb5e5d0c35f48fc930fee446adb1e5a9a7594083b76b9846", &(0x7f0000000440)={'syz', 0x2}, 0x0, r1) 23:55:37 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) 23:55:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) 23:55:37 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000240)=0x3, 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)=ANY=[@ANYBLOB="f4fffffffcff"], &(0x7f00000017c0)=0x6) 23:55:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffff03010000000000200002a1c09a6ee5fe2d66000000000200000000000000000000000000000000000000000000000400000000000000000000009d00000300000000000000000007000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xffffffff}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000380)={r1, 0x2}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @local}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x0, @remote, 0x5}}, 0x7fffffff, 0x6, 0x7f, 0x9, 0x7b4}, &(0x7f00000002c0)=0x98) 23:55:38 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) socket$inet6_tcp(0xa, 0x1, 0x0) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) 23:55:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000500)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e22, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) eventfd(0xfe) r2 = socket(0x5, 0x0, 0x7f) bind$vsock_stream(r2, &(0x7f0000000280)={0x28, 0x0, 0x0, @reserved}, 0x10) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000380)={0x0, 0x3}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000400)={r3, @in={{0x2, 0x4e23, @broadcast}}}, &(0x7f00000004c0)=0x84) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$TUNGETFILTER(r0, 0x800854db, &(0x7f00000001c0)=""/191) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:38 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000200)) 23:55:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000838000000ffffffff0000000000002000020000000002000000000000000000000000000000000000000035d52a936857f4e798632b587690000000040000000000000000000000000000030000000000000000000000000000000200000008000000000000000000000057ce5c1dc9b4dd45"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) 23:55:38 executing program 2: socketpair(0x3, 0x5, 0x100000001, &(0x7f0000000280)={0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x4012, r0, 0x180000000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000003c0)={0x2, r0}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000400)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4040000000000, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r2, 0x0, 0xfffffffffffffd2f) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000440)={0x1, 0x1f, 0xfffffffffffffffd, 0xffffffff00000000, [], [], [], 0x1, 0x0, 0x1, 0x20, "e5ddb058c83a4110563e0292d9b377d3"}) r3 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r3) openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x8df90f0c97695c73, 0x0) 23:55:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000100)=0x4) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRESHEX=r1, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRES16=r1, @ANYRES16=r1, @ANYPTR, @ANYPTR, @ANYBLOB="6dce324b62f3877bd167d4c814cddb72266216d83d7835bbfe4497ad60b191886a09078c4909cbc27fb5bf5ec663f36f40d11a00b29c30424e8e74491a73399293bd08b334e7a1303f5cd702c8a156cbf71ba4df0abe7ee74c31ec0da8559a2d976caeab349613b31278da6123fddb36aec28c059c84ea170948260972e6154bbdfb143b2298c95f46420cd73c884df158a45bc8921096e8bc8ab67e7eb1742e970c88754249570855719e83e085265c85987a05706d3f60679c0b1bbdf26aca44494d66d7f6ae75e8756a97f199eea91033cdb81a7f58d4102286ceee54a20b4f759f60ffed00b9321de363e8f7bbb96f9c767a6bef460a1b"], @ANYRES16=r1, @ANYRESHEX, @ANYRESDEC=r1, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYPTR, @ANYRESOCT=r1, @ANYRES64=r1, @ANYBLOB="b678c4e73c3b002375695c3636a9f2545ddebb1c829b276e92679082ce5ab0f0318fa8339f6d8b4722a5f45fab2c10560a9bbb984ae8cbebc42dae5ad5f388eb98dbf62e2f23cfe75c7dcf8e7609c05f8f2e405a1968efbfb0d23cee31da93a962fd926d836931d30e93acd30b12080b9d25531d49566910c41d3da26bd381d6f9eda7062e64974bd008a303849f1449cbd5f01e4b9413c13963128868ea938fae5c377609d7c2c2b9d90e6b9bc22acc31cd087dcb41b537154bbccbfad38c5cdc6094cd82d65116009854051d0f01a51fc799a317a31b750aead4433ff6aafac951252d9da8e860923cb72c30", @ANYBLOB="2b726ad32a892e0e711a85f9d7e323bf37b0df54463dea88f3707fd20e5c81554ad44179c581af705f847caf537614bdbb9f67e5f6452702ba2c19ee23be9d01171b49fce0e7d993cff6f500d8b002d0b3a108a8e2c4db2515be9a7c8c21557c7214ad5d03f7389dc2cfa332a54e4739954b2d84f1c7c8a150383d46f5be249d75247c482ce23094c77ed47eed0cc4a53bdf73e2919370dd4a56b1faaa1e086978292d04dd312c39a19c00bea764aad3c8b2", @ANYRESDEC=r1, @ANYBLOB="67fa7f36131f2aa2616faf506bfabf9eef87d0f8a05eaeb648d750a3d4b39b4c6109b8e035f525263ca6d6da5912da64f2f0f960e6a1113b078423599621ccea3981e0cbb438f351d1a796cb20886e86eec150a63634caf18cd907de", @ANYPTR64], @ANYRES16, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1], @ANYRES64=r1, @ANYRESHEX=r1]], 0x8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e20, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) [ 763.933323] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:55:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80033, r0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) 23:55:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @rand_addr=0x5}, 0xfffffffffffffd7f) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) close(r0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r1, 0x7, 0x1, 0x2, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000000, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000200)={0x3f, @multicast1, 0x4e21, 0x4, 'dh\x00', 0x4, 0x3, 0x5c}, 0x2c) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000380)=0x2000) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, r2) 23:55:39 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000005068af1f1900000000ed0000000004000000000000000000000000000003000000000000000000000000000000020000ea080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3000000, 0x80) write$tun(r1, &(0x7f0000000240)={@val={0x0, 0x8937}, @val={0x0, 0x0, 0x6, 0x10000, 0x1f, 0x6}, @ipv4={{0x3b, 0x4, 0x7, 0x9, 0x378, 0x65, 0x1, 0x2, 0x77, 0x0, @empty, @loopback, {[@lsrr={0x83, 0x17, 0x6, [@empty, @rand_addr=0xf9f, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @remote]}, @timestamp={0x44, 0x40, 0x1f, 0x3, 0x149, [{[@loopback], 0x6}, {[@loopback], 0xffffffffffffff01}, {[@dev={0xac, 0x14, 0x14, 0x1a}], 0x80}, {[@loopback], 0x7}, {[], 0xd5}, {}, {[@loopback], 0x5}, {[], 0x3}, {[@local], 0x40}]}, @lsrr={0x83, 0x1b, 0x1, [@remote, @rand_addr=0x40, @broadcast, @local, @broadcast, @empty]}, @rr={0x7, 0x17, 0x0, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}, @cipso={0x86, 0x4f, 0x7, [{0x6, 0x11, "231bad803ff9aa134f0f68d264d895"}, {0x5, 0x8, "b8dbe4e6dc16"}, {0x7, 0x4, "dd64"}, {0x7, 0x12, "a57a1679d87d12df301890d38a25d65c"}, {0x6, 0x5, "bb73ac"}, {0x7, 0xd, "d406c6b01e8d4fbcfaea05"}, {0x5aa78b0afa0daa2c, 0x8, "6ed34b7f8513"}]}]}}, @gre={{0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1, 0x880b, 0xb7, 0x1, [0x7, 0x79c3badb], "5f213a782fa418a0d13f8299d62712bade4a343b03cefb871a64bbff0c2f2a37f4178b97d14e29e6228d955bac3790b5dab755c8eb678ba161a5c754cb6731c954ea1ed028848db6e6b42e0baa3b1957b436bfd4a3dc5efcb0c96e0a5be0f0a41c1806705cd21714f81135f8dfec6ee506c275ac76163994abde6fd16fb335adcba4bcdfccc481b4d9d1c64da99c752c57a3ec60c035ce1813c9b7e85560d7314ce6f001969727d58f343694daed9512cd5384454b462b"}, {0x3, 0x0, 0x2, 0xfff, 0x0, 0x0, 0x800, [0xb5b, 0x3ff, 0x7], "f0045b01ea228204cfe8b64661370b9df0a4152f1e0728cd1ad05505375519970c496fc34a5ffd65b656e088197e1822ce0f6db11fa04ee971f7d30e001a51e827bf2460522365a362ad66f312973b9155e35d0dddd961dd684a6892cecf289fc1f7006bc5e4f3ee50eaa1b3"}, {0x1, 0x0, 0x2, 0x4, 0x0, 0x0, 0x86dd, [0x7f], "adad0c7cb22cde8d687118fc29fa9736b3adad3003e62b9a4fdbbc254c3856891ec0da4a854764228984b3e825b0422d8a9273e4bed299724ac2166b611b234ae03bf9c9d81b34a8b5fe161a66d0bdcf3f20fd80172372545e897f8a204ef21c02ec6fad632034c1066f141f9f84e615bb4aa51ca170f232fca50a09ba300d0207f0d59cf2706b5f2a"}, {0x8, 0x88be, 0x4, {{0x5, 0x1, 0xdb4, 0x0, 0x5, 0x3, 0x3, 0x8}, 0x1, 0xfbe5}}, {0x8, 0x22eb, 0x0, {{0x3, 0x2, 0x1, 0x20, 0x2, 0x9, 0x7fffffff, 0xe92}, 0x2, 0xffff, 0x1, 0x7, 0x100000000, 0x4, 0x100, 0x7ff, 0xa2d, 0x1}}, {0x8, 0x6558, 0x4, "7612c96b3f1483445f5336c0ddd767f8fdb631202ae60c6ec5ebe5caf76aff60feb9ea75ec3f8a8756098256faa4ae12bdb7427346a32148cf51558a7613208c52f37d59db7516179a2cd99b01ed25343b79c4bb5b969e185f2814e1d9de936ae3a96e7d864eb34b6256e72bfddac96d14af12c8698bbe9402d350b18d4bc84a1457bfea945c9b49144730294b0f493a"}}}}, 0x386) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) [ 764.679299] [ 764.687355] ==================================== [ 764.697954] WARNING: syz-executor5/31675 still has locks held! [ 764.708270] kobject: 'loop4' (0000000068356e70): kobject_uevent_env [ 764.714723] kobject: 'loop4' (0000000068356e70): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 764.717850] 4.20.0-rc4+ #261 Not tainted [ 764.774957] kobject: 'loop0' (00000000dcfe8576): kobject_uevent_env [ 764.789596] ------------------------------------ [ 764.800083] kobject: 'loop0' (00000000dcfe8576): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 764.810885] 1 lock held by syz-executor5/31675: [ 764.820164] #0: 000000009f52aa86 (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 [ 764.835203] kobject: 'loop2' (000000008f24f2d2): kobject_uevent_env [ 764.845192] [ 764.845192] stack backtrace: [ 764.857954] kobject: 'loop2' (000000008f24f2d2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 764.867768] CPU: 1 PID: 31675 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #261 [ 764.875147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.884520] Call Trace: [ 764.887124] dump_stack+0x244/0x39d [ 764.890774] ? dump_stack_print_info.cold.1+0x20/0x20 [ 764.895995] ? vprintk_func+0x85/0x181 [ 764.899889] debug_check_no_locks_held.cold.49+0x93/0x9f [ 764.905338] flush_old_exec+0x1ea2/0x2480 [ 764.909477] ? save_stack+0x43/0xd0 [ 764.913094] ? __kmalloc+0x15b/0x760 [ 764.916798] ? copy_strings_kernel+0x110/0x110 [ 764.921365] ? iov_iter_init+0xe5/0x210 [ 764.925328] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.930854] ? __vfs_read+0x11f/0x9b0 [ 764.934646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.940170] ? fsnotify+0x50e/0xef0 [ 764.943785] ? fsnotify+0xef0/0xef0 [ 764.947435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.952961] ? fsnotify_first_mark+0x350/0x350 [ 764.957803] ? __fsnotify_parent+0xcc/0x430 [ 764.962115] ? fsnotify+0xef0/0xef0 [ 764.965736] ? rw_verify_area+0x118/0x360 [ 764.969871] ? vfs_read+0x1ce/0x3c0 [ 764.973498] ? kernel_read+0xab/0x120 [ 764.977289] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 764.982293] ? load_elf_phdrs+0x1e4/0x270 [ 764.986459] ? writenote+0x3d0/0x3d0 [ 764.990161] ? __kasan_slab_free+0x119/0x150 [ 764.994561] load_elf_binary+0xa9a/0x5cf0 [ 764.998698] ? find_held_lock+0x36/0x1c0 [ 765.002757] ? notesize.isra.6+0x80/0x80 [ 765.006805] ? ima_file_mmap+0x160/0x160 [ 765.010853] ? lock_downgrade+0x900/0x900 [ 765.015016] ? kasan_check_write+0x14/0x20 [ 765.019244] search_binary_handler+0x17d/0x570 [ 765.023819] __do_execve_file.isra.33+0x1661/0x25d0 [ 765.028834] ? prepare_bprm_creds+0x120/0x120 [ 765.033320] ? usercopy_warn+0x110/0x110 [ 765.037375] ? check_preemption_disabled+0x48/0x280 [ 765.042383] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 765.047940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.053476] ? strncpy_from_user+0x411/0x5a0 [ 765.057882] ? digsig_verify+0x1530/0x1530 [ 765.062136] ? kmem_cache_alloc+0x33a/0x730 [ 765.066493] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 765.071094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.076628] __ia32_compat_sys_execveat+0xf3/0x140 [ 765.081551] do_fast_syscall_32+0x34d/0xfb2 [ 765.085865] ? do_int80_syscall_32+0x890/0x890 [ 765.090434] ? entry_SYSENTER_compat+0x68/0x7f [ 765.095050] ? trace_hardirqs_off_caller+0xbb/0x310 [ 765.100057] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 765.104887] ? trace_hardirqs_on_caller+0x310/0x310 [ 765.109926] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 765.114938] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 765.121591] ? __switch_to_asm+0x40/0x70 [ 765.125636] ? __switch_to_asm+0x34/0x70 [ 765.129687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 765.134525] entry_SYSENTER_compat+0x70/0x7f [ 765.138923] RIP: 0023:0xf7feaa29 [ 765.142281] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 765.161176] RSP: 002b:00000000f5fe60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 765.169322] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 23:55:39 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000826000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000a0e000/0x3000)=nil) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40402, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000100)={r3}) fstat(r1, &(0x7f0000000200)) [ 765.176595] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 765.183862] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 765.191119] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 765.198379] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 765.217741] kobject: 'loop3' (00000000f11ba32a): kobject_uevent_env 23:55:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000280)={0x0, r0, 0x401, 0x4, 0x1000, 0x1}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000380)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 23:55:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) getsockname$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000340)=0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) renameat2(r3, 0x0, r2, 0x0, 0x7) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:39 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = getpgrp(0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) [ 765.224212] kobject: 'loop3' (00000000f11ba32a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 765.278956] kobject: 'loop5' (0000000072072c3c): kobject_uevent_env [ 765.285448] kobject: 'loop5' (0000000072072c3c): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:55:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sigaltstack(&(0x7f0000fff000/0x1000)=nil, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x8, 0x80200) accept4$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14, 0x800) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000440)={@loopback, @rand_addr, 0x0}, &(0x7f0000000480)=0xc) sendmsg$nl_route_sched(r3, &(0x7f0000002180)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8100}, 0xc, &(0x7f0000002140)={&(0x7f00000022c0)=ANY=[@ANYBLOB="501c00002d00200225bd7000ffdbdf2500000000", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="a0000600185a77f7b33cad9f3a6b38e702f95a27bfe9fca2f058bc04d540c94d70a288ade2e6ce9a2d74890ce72f6d96f18b79da81fc857a49e63045aff4d7cb96694c69695e6f67995c60faae4b15f1f84fa6980b0b49649474559f4b4e85a255810ca7e2b386c7efbb0578b4114473406e858efe8178882089ddb5286f1c8b12c5b8fe075ecd5f2f36b271b01e5f34c5499a83f9376ed45cf999cb78f1cf000000481802004418060000000c000100706f6c69636500002c08020008000400018000000404020008000000ff7f000001010000200000000200000080020000010001000400000007000000ffffff7f3f000000000000802b39000004000000010000800700000004000000c36d0000010000004e6e000002000000ff0100000300000001000080930a00006e0100000400000001800000001000000f900000010000000600000000100000020000000800000000f8ffff0000000001000000000000000300000003000000f606000001000100020000000101000000000080040000000200000008000000030000000300000008000000040000000300000000800000fc0d0000200f00004000000000000000ffffff7f98661d6a018000000600000040000000070000000400000000000000530100000400000009000000301600000400000000000000010000000000000009000000001000006f00000008000000670b00003fc600006704000008000000ffffff7f0800000008000000010000000500000001fcffffff7f000009000000060000000700000004000000ff030000010000803300000000080000000000000000000003000000080000000200000000080000030000000800000009000000ffffffff46b100000100000007000000070000005b07000020000000000000800100000002000000000400000340000000000000080000000000000011747f4ab5a400000600000040000000dc0a000000010000030000000000008009000000008000000700000080000000400000000600000008000000020000000700000000020000ba5a000009000000010400000000000009000000800000007d0000000900000000000000090000000200000000000100800000000900000001000000030000000400000003000000001000000300000063000000000000002e0000000600000002000000ff03000005000000000000000600000001000100bc0000009823ee3c040000000000000005000000080000000600000009000000c70400000200000003000000010400001e0000000200000007000000000400003f0000008c830000ff010000e50f0000400000000600000006000000010000000004000020e300000800000001000000050000000004000002000000dd1200000800000003000000ff00000004000000010000000400000009000000f02700000600000003000000010001000104000009000000e0190000000000000700000009000000f8ffffff06000000070000001f0000000700000007000000810000008adf805f000400008205000000000100060000000000008000000000ff010000dbf53d5008000000010000000300000000000000ffffff7fbcad00000104000009000000410000005b2400000500000004000000ffffffff010000800010000076000000b90a00000300000000010000210900003f0500000800040000000000040403000200000006000000050000002c0300001f000000030000000800000004000000060000003f0000000900000003000000010000000500000006000000060000000800000003000000030000000200000060b2000006000000000000000010000005000000ffffff7f0800000000100000e40100000000008005000000010000000900000000000000ff0100000900000001000000e91d000000000000040000000800000007000000050000000400000002000000750200000000000059780000080000000000000003000000ff7f0000010000000100000040000000030000000800000007000000030000000400000003000000090000004000000000000100000100000000000001000000090000000300000001000000000000009f0c00009a0500000000000008000000fd0300000100000005000000020000000200000005000000070000000700000059000000000000800300000036000000020000000500000000f0ffffc00d0000ff0300000100000000100000ba840000090000000300000003000000040000000700000000000000070000000400000070a300000300000007000000010000801f00000006000000ff0f00000500000009000000ab280000fffeffff930b0000000040010100ffff030000000100010000000000018000000500000001000000030000006a00000000000000ec520000cb0000000100000000ffffff0000000006000000be000000000000070002000007000000080000000900000001000000400000000500000003000000ff010000590000000000000003000000080000000900000000000000070000000600000008000000d5000000000000000010000001000000faffffff0800000040000000040000000000000000000000090000000400000008000000060000009baa0000faffffff010000003b375846030000004000000003000000080000000500000008000000a2418b63ff0f000000040000e50b0000ff0100000000000005000000b8ec000006000000050000007f0000000100000001000000010000800300000005000000e40a0000b379000004000000060000000000000002000000c406000007000000f10000005f00000000000080010000000008000006000000008000000900000004000000000000000200000002000000050000000300000003000000000000000000000004000000ffffff7fffffffffffffff7f5f00000009000000000800000700000002000000020000004f00000003000000a100000006000000060000000002000001040000ffffff7f000000000500000081000000ff0f0000ff030000bd00000084020000000000003b0d000009000000060000000104000000000000a80f00000080000005000000018000000100000008000000e90000000500000008000500018000000800040001000000041006001f05d61bc6285506638a9c7d6155bd8cb5c123b034526515d658a5ba93b4fd1901d6ecf2c2037b85b690b1c234cd35df56695489a21a5db6f5fbdd3f4d648d8f587d1c4cc48e7c0b3f6cd0aa7f25b5942ccaf242b80c0170e7cf751f5e9fc21cdc574bd93b014348528f550fb64b31001f7619759e4ebcc3bba1efcc1e2d4d46131bc1fd5e7ce8b925dffcb0d986c918f1f7c0baa1414cec6303af5b657e144b24bd35822cf9dcd5570be9acfc3e40cf652cb7b3a97c85bf23c4293d05f0fbc087119b9ad98000a36c8c915faf97204093e9d6f7333c25d34908b9011781deabdafa38a515d6d466378e6f89966fdb7f93c9e6ac3f571c93bbc426e10c0396930e10e8099b63fa54d64e837c4b01afc3b0467dc0a890ce47a886194dd9f3aca25051ede6cea72e59af40c5f321bc91d8594b5a0c475eb9b78423eaba31f5215d8d5057d791606b572f18af94dc1e8983f039f6359f1cafd27d2b25028c901f5d32d69f7a0e148d98e9f39fa717218bf8ecbf33ff420feadbc6a7560aefc7f65938d7536e279c5e67c9ce73579856bb49be736dc3dc09b73e63fe349555cac830bc8e6c23c8e1914bc4ba84adb830a11a5909566dbab6f74ed24b2b456a0e87fa07db7dfdb4108d296541d4c4afe37099b99ba042c8104207a79d9ee95df6633585bd3bb8bd8f47147f0d2707c29e9e80fbd5c84f44cae78056d9af6ecc4b746f562e2bd1f7caa861e65d63ceadc201a92e2c919f3b9686ae1086f9b96c6bff0af4f5670d1730381a532965c8e749581b2e86fb338c1da3cf4951436c601a1223f04b6ff6729dddc59b41820f187fde651f037cf6787e5bcc4b16a55dc59a63a988c655bc5df422135c1aa88657491dd41e5687d3cc732a64f08ead335b153a8dcfd9b2f603bd95a16b78698ad724a64dc28c60f68885535363a70ec0bc26e613c6dac031525815f6aa33a9b3ba0a5ff5fbaed12530c952781a39d9e24c7a4d7e71a5e3916ffeff49de285ae2919b0ea77021501c4c70d349cb540df3f2fd2a83b57a99febeb0c968e6a34e7770270f542d4678ddfa097bab172f688c85d6e9c23e3057f44820a03f8b3f85acad0d1ad99b0ee1d44d7c8acb25109b69bea98388bacac76b1f3c3af23aa2e6a9518dac92f3caec9b493d0481220d2a7c4ac6f43216662b11096084da5db9dad9db3b9aa5edd6f7af4e8f319889c2238e13ae12ed76070c175972d3321bce93f05f755e14f00586fe4d2b3cca997668817a03eb6d250c3d567bfacddaa5b581ceefeded94d929e5f955bc7519c456329a7ff881339d1a64f256f4dc836b133cebdf46a9d64dbd105f4e012b9221d0353544da6891cc9b29e03abe613b6bb9e0f104d8723a3da5a525a15ad9c6f034324aa987f4467ec38f78b9aad89d183eaba649ad47e9f7223d760875ef2c661b39a4413958cbe3996940be8b5440659cdc21bc27f043cb949e12ab3f6e728ab785efba350722b5190c96e4dba6ef0dfad54a4d2e433c245b0c8f7b6243e190d88c449fb5c231502f82aa2a9152848f4a14ed1ae847ef07deb56fdbf1e0dbb40d28a7254fabf1d418a7ee7af7f017f6ed90d0501457411a07a648aedf20e4b91488005c5e7f520957129e2e85458ff4fe3e50cbd31e1af3213fc9741eca172ce822e1e90111dddf492058973281105a46664b1a5e5ea1371910dc70b2c1279a1170018643ef319da27a6d54701488adc9568d7e61ae86e8546ff554642251c918ec3c063f664213f09ba8e336fb453e5abe096e50d4b7d3dfba18fd0cfe3b4427ff67cc2fc10ec4b7548fce1d6c9a6010cff4afa12e537ab4bf9a0a10036e793f7e299c09a562e8ae260d11aa894c9ae599168bc8dc784305365906b72471441bedc74877b2f8b6be5aca4044ca2a85de4ffc6bae0aef77c80c7db4a63c6ab3f8d69ac304aa85205fd3fe907c316c1a3ab9d5b5402947ffb6edf56b04c3162891564e79d49c120be173c684e8d15b869fbdd98d08f1731df6f25cdc3306689d1e7b8816bf0534811f324929f9f928d007c1fd1d83a7feb4d6f86ee7c8cb0bd27dd579f92d4bd4a84331694f44e5dcf62d02cf76e457df3724a0c799903baefe154bd1906acfd49225aaebf0213ec7074ae7dc29f4d33f6bf8eaf1655850c09c71f53e02f08471d138d1100dda8f694f8012dfad75060fcbd417a290f9b08d6a964513ce1732fbefa395f9586b4b6f28593083010e43e3078dd4c768ea717981cc2f439e800f5a3cd37eef03de553db0efc137758f61aa1bf434624030713145be829136c379ed88e109ca0809e6a106901993c1b448761abe727e3dffeebc23a029730abd62de610c4cd2d112f3d011fddba47dbc11c16d1871ee29c7ca623312e35d8e4f3a41a3a0a01ded2fb795b2b10b96715eaf0d13368f0e3b0ad4ad35f9aee74dc8747c175cc57265d8e0c1f8634d268d516e65dc4f8ce04970289ef17e2e5e2ef63761374ac2cf4cdf202fac3d6516a4af85c3f6d2ee1e09bb396ab0292cd0de3ad2b3898c518123e668aa0702bc0f9c6192bb8be11542c3ce02297abf8299239da7a4b245426b13a5815e57c123c4757d9d1b4f5e99e95d7bbd1588159637c2685157d3a336b7fe642fafd33fd69e937337e339f6ec7cfb011a9964b0578e67379d256270830280accad24114b331326517f4a2487c13db0c785fe085b9b59d6716312541cc8329c64c89a1bcb7b53ce735a6e49765538af68438ebfec4241c30b4c77fc7e2b233f3f15040830f4f0b983eb20aaf1d55c32a996a8d894ccf9b1be3d06de6351f8a6c76efe7efce6427771074320552307729ee08524fb2c7fa2a647a474f1610c91bcbae3eae58bb66206954572aa69f025247bd4e28c57cd6aae406e2281b181803e30a71722749538539878982fa394aeff23b28dc7bb63ce7353affbd4b6486a8abf8577c8ff87d7a7ddec8520cdbfc4e537f74a292b32f45513041f9498a0b9c43c56070f1bf2b96a8bc4fbd949b0f4e24cc21c97dd98f18e5081b0b07f9568b6b691a769005046e4669fa791214fb303a346886288248656006973741d47f267ba0b91108bbc4e14a1ebef909346d9a40cd56d10055364c42717962866932df333528ad363ab47ddad0bbb32a23e2a524370fc31545128586c794137a255eaacb9ffaa71c0e84e392fe8fdf65731e7928998f1162d922895671807fd723436bf9ff052ef32f830becd192b93d3fd8937dffc0220be70aa1610cf5f84794cebae8fa6f5abe36da86b8f73c71365623ecb1180320597512c80250e34ff560112ab1eb9f76030908ab4d118a8b9d94d5ae479c7785dbbeeeb4dcb4288b2258ba1c7e00bcdab93763b4084702301853454407f3ee8c40cffafe493149a13fb88278f92cceddd81a3a21d371ea304dcac858b4e6299c0fb3a3ab12f8af3ce426ba7d8f92f58b4b9dffe681af6530209f503c3c04b64f48cb2315381ec1f5b107989d4a140d2d7093c96d2f7c6866df826a4c7897e57f3b9d7151a23c403fb6aad0ac77664bc2f547ab2979280f10275531d609ac25b45cba759a14b73f5c628e396a02ca5646c79fc057303a09e5d36119c7a3e5feca53106038d36b99756b7133c9e3be82d071178049536cbc124d0bbe67247683bc295952be5625de7291c1c399db9808d28580ec223c355635806c8a0033043a513dfd346c259561a09c66b0a05c864ad04041de580933dfcf2b25ab02dacc2882568fe147baeb701e483057284e786516d694553385d3b344da89a774b421094a941401705cd32e3595d37373510b63b9948d2e208adb4bbb18e1740dfd0335883f7ae35116c2a9afbb2c3b93019c74a80f7362cbd288db5690c156bd696bdd8b0700abaf764a876f60350dd6b6930e76853f0bb8bb9cb65354b2db0be1dfed73443ead0b30116051e5a67cad77c3be2e6f219bbfb9d3b14890d0287a37599c579cfdeb02c9aa9d904f05414dfccb933404078d3b098f1fc3984e165800f2819815849c0710e7803638abb58a071f1ea0caad3ce4bde60543e5af3aec336baa6aaba70a4394bcb42d59c3d7830039322e81c109203eb74e9ee074fa2da01da856b84be24064fe2b2764f9df94fd4a26e6b931169a3ff75da7746b1d08415299bf8be85c58846922a9a5ecb4585f53970c549dbf4f82e75fcbca6a81bb10c9913e7783420ad4b3666d14d2fdf30ebaddeebfa32eeb9819f2c20300704387f029b5770972abfd1b291b0e12394fe93849b5a542227f20607bd439288ec2bce02f1e2a28eb1eb16ad99a790e2f6b9dd76b381143242ebb964281f035e2b9b22d1206fa9236d3de7bc86250296e728f44860deb666a1a7f31107c12b952bae4e24bcfd27659307749cfd56e69fb8dbe4cb577dfc1ad162f20f8a78c6a81bf372dd37a5a4048519cfc4267d21f193db78ab271096cff3a7e9da2878f738b7b69fe03863fe1fadc8cd72dba10133edeec23ed1a6d389536ac211078322261040b810750400cef6cbf1d69ee683805f9a149241e3f780b988dda9ea2152fede75c9aa5d5098809e5e4e388fc327a0bde415b99d28056db4b3eb3829193c0d5d8bf363d347ea1eae9d709373bf35a29bfbced06ff49cd3cf77fb15f04a5b687ee70f282ddcaa6b27f534e9610a7ad9ce0cd2099c4ac594875f9fd26f17bee1b2d6ed35faab2f4943bf16545fdad2cc8e45526d5227a5c5e095bbad15923a6e7d8dd6ccf8d0e9615e16506a170b22090084df358d00fde2f14cd2d9c23874974dc6dabbff9b58dccde279072dd4d0917f882f55b439cf6ff02244e45d338fa99519654e14f6ef56fc9e41b2df18dd1c08746fc33088dcc1c036cab9bc609266c3fd16ebb039e0a3fa61e2c584924e8ad69242921d1fe7cf1ad53c4614e9da32439644bb4cfc64abca0554207f866edb3ed208fc9269613a9489d328168702ca8abfbeab1511d6396404a69dbe68b7255d223e51df766943c2ae034b0aba610626b1155ac92e8a525c060a25a04f1590fe64208fed67b8af53466b31a607b2968aca95f5e1147ee631d28606b3bc479e12ae74cc21f4de1e02d54e32748fd1d6f50d47edb4d2bec085b2485d5e06c5df5d010272274d030163541e1dadb9940e24de97c1183f9fafde17fa6c81631b7b412b3d8e4d13ddabc88746911631230c2c92695fb55d6d3c9de7dedb096fda66d29951d61ccb5d90feefbf59840abdf8ba56a91cb067ee6fc944c3b80092f04b32a8b86e59bc44c206fc616d4e4b3a6a7e496f7a47c1146ce8eaa952c346db7e0dbc417bdbe3bc5843a3ef8ca976bf1691cec2415080791f0351fcaed927cae0a95cfe9041f8ab29942615be20d09ed7760532a365d035601fb47492219e4ac0904b43574ec0bf33eb39aff447033de416b81e7dd085f856fda17eeaf4cdb8607a9074331df67233aa2d1abf2fefc9952a061248140c138cab7368c1e1aa327dd2b3ddb7d241b67e4870c84897a96f34b66c39304ed1b82af6a84d7f282883520b06d8340bddc4170f7dea59844044de423e5138396c6d215adedba67bf8fdb1418f0fbb776b234dc25984f47d43ce47f4b9665ab6f63caba75f49c654a603ce8d898c262dae4aefbcac2e95e0853a3e121d64b809b28912b480038f321eecb9f2adaf23b40721148f2dcef69642f0708772fa6662bb3aa8e69556bea57682b79af19202ca3d424945ce1ba90f6b8e8eddb038aeda32aca59b76fb9a407f5b6569b8a75fc34daf40354c0a998c0bc08e66e4f69043a36c89494f5a20000080001000300e0ff080003000500000008000300000000000800050070270000bd75e519a0b2129b0551b194c5c0d64811133cefc6e08c86660b9c309e9491731c04"], 0x1c50}, 0x1, 0x0, 0x0, 0x801}, 0x804) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f00000021c0)={0x0, 0x33, "d178a7006a91140365ddff2be996cb49e262ba9001aa6d2fb33132b49072b9da7ba07a00fb56cf77fe8b4389d155a9455bd5e2"}, &(0x7f0000002200)=0x3b) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002240)={r6, 0x1}, &(0x7f0000002280)=0x8) [ 765.368034] kobject: 'loop2' (000000008f24f2d2): kobject_uevent_env [ 765.376401] kobject: 'loop2' (000000008f24f2d2): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:55:40 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, 0x0) 23:55:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) connect$can_bcm(r0, &(0x7f0000000040), 0x10) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 765.459049] kobject: 'loop1' (000000003e86b94a): kobject_uevent_env [ 765.468343] kobject: 'loop1' (000000003e86b94a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 765.506156] kobject: 'loop5' (0000000072072c3c): kobject_uevent_env [ 765.524319] kobject: 'loop5' (0000000072072c3c): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:55:40 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:40 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x3ce, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) [ 765.607042] kobject: 'loop5' (0000000072072c3c): kobject_uevent_env [ 765.623078] kobject: 'loop5' (0000000072072c3c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 765.661740] kobject: 'loop4' (0000000068356e70): kobject_uevent_env [ 765.693707] kobject: 'loop4' (0000000068356e70): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:55:40 executing program 5: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 765.798410] kobject: 'loop5' (0000000072072c3c): kobject_uevent_env [ 765.811976] kobject: 'loop5' (0000000072072c3c): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:55:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0) [ 765.953305] kobject: 'loop5' (0000000072072c3c): kobject_uevent_env [ 765.969314] kobject: 'loop5' (0000000072072c3c): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:55:40 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) dup(r0) mq_open(&(0x7f0000000080)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x42, 0x1a8, &(0x7f00000000c0)={0xffb, 0x6145513c, 0x16, 0x6, 0x101, 0x1, 0x5fbb, 0x100000000}) rt_sigsuspend(&(0x7f0000000040)={0x2}, 0x8) fstat(r1, &(0x7f0000000200)) 23:55:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_init1(0x0) [ 766.079398] kobject: 'loop3' (00000000f11ba32a): kobject_uevent_env [ 766.085872] kobject: 'loop3' (00000000f11ba32a): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:55:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f452c46000000000000000000000000000038000000ffffffff00000000000020000200000000020000000000000000000000000000000000040026d0b86d585b2f00000000000000000000000044e7508948b06d8de241479400030000000000000000000000000000000200000008000000672300000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 766.160426] kobject: 'loop5' (0000000072072c3c): kobject_uevent_env [ 766.186606] kobject: 'loop5' (0000000072072c3c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 766.366973] kobject: 'loop2' (000000008f24f2d2): kobject_uevent_env [ 766.391351] kobject: 'loop2' (000000008f24f2d2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 766.468251] kobject: 'loop1' (000000003e86b94a): kobject_uevent_env [ 766.540871] kobject: 'loop1' (000000003e86b94a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 766.619235] kobject: 'loop5' (0000000072072c3c): kobject_uevent_env [ 766.687689] kobject: 'loop5' (0000000072072c3c): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:55:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x8a000) setsockopt$inet_tcp_int(r1, 0x6, 0x1000000000000006, &(0x7f00000003c0), 0x5b9d367298a8a306) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_setup(0x7f, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xfff, r0, &(0x7f00000002c0)="bcfb54e77481389950c01dc8a55f7f2ba1a6715f1054ac9bc3c7434aafed7509085449ba755cfb4e916ec788ad7e0d2b5c45dcec884a28d27f1353dcbda7fa77191a3857835f208f4960b0906d656ec8f1bd882fa056a4b3", 0x58, 0xffffffff00000000, 0x0, 0x2, r1}, &(0x7f0000000380)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x1f, &(0x7f0000000240)=0x27, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) 23:55:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x301800, 0x0) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000380)=0x316b) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0xffffffffffffff5e) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0xfffffffffffffe1a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) 23:55:41 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, 0x0) 23:55:41 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x9, 0xa, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet6_dccp_buf(r0, 0x21, 0x0, &(0x7f00000000c0)="1b097bede7ad13", 0xfffffffffffffe93) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 766.792940] kobject: 'loop0' (00000000dcfe8576): kobject_uevent_env [ 766.815215] kobject: 'loop0' (00000000dcfe8576): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:55:41 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = memfd_create(&(0x7f00000000c0)='wlan1\x00', 0x5) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000ffffffff000000000000200002000000000200000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) sysinfo(&(0x7f0000000080)=""/3) acct(&(0x7f0000000040)='./file0\x00') [ 766.914911] kobject: 'loop5' (0000000072072c3c): kobject_uevent_env [ 766.982249] kobject: 'loop5' (0000000072072c3c): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:55:41 executing program 5: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000060000000000002300ffffffff000000000000200002000000000200000000008600080000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002000000080000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:42 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @local}}, 0x3, 0x7ff, 0x1, 0xd29, 0x3}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000600)={0xffff00000000000, 0x4, 0x5c, 0x80, r1}, &(0x7f0000000640)=0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-monitor\x00', 0x408080, 0x0) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000780)=0x7, &(0x7f00000007c0)=0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0x2, 0x3, 0xb41d, 0x7fffffff}, {0x400, 0xff, 0x5, 0x8}]}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000380)={[], 0x38d0, 0x10000, 0x5, 0x0, 0x1, 0xf000, 0x0, [], 0x19}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000240)={0x9f, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}}, 0x104) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000006c0)={r1, 0x1e, "25b5c44501c2c5bb52e84abba6f199cee7bda08c966b34f585cbe0100f29"}, &(0x7f0000000700)=0x26) sendfile(r0, r3, &(0x7f0000000680), 0x2) 23:55:42 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x7, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x8000) fstat(r1, &(0x7f0000000200)) [ 767.516335] kobject: 'loop4' (0000000068356e70): kobject_uevent_env [ 767.525244] kobject: 'loop4' (0000000068356e70): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 767.558730] kobject: 'loop3' (00000000f11ba32a): kobject_uevent_env [ 767.573713] kobject: 'loop3' (00000000f11ba32a): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:55:42 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, 0x0) [ 767.674864] kobject: 'loop1' (000000003e86b94a): kobject_uevent_env [ 767.682830] kobject: 'loop1' (000000003e86b94a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 767.712851] kobject: 'rx-0' (0000000071003365): kobject_cleanup, parent 000000003d0c2e8f [ 767.736832] kobject: 'rx-0' (0000000071003365): auto cleanup 'remove' event [ 767.756341] kobject: 'rx-0' (0000000071003365): kobject_uevent_env [ 767.772390] kobject: 'rx-0' (0000000071003365): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 767.815147] kobject: 'rx-0' (0000000071003365): auto cleanup kobject_del [ 767.845956] kobject: 'rx-0' (0000000071003365): calling ktype release [ 767.896073] kobject: 'rx-0': free name 23:55:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x1, 0x34000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e22, 0xfff, @empty, 0xffffffff}, {0xa, 0x4, 0xe00000000, @dev={0xfe, 0x80, [], 0x1e}, 0x8}, 0x20, [0x8, 0x4000, 0x6, 0x1f, 0x20, 0x2, 0x9, 0xfffffffffffffffe]}, 0x5c) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="210006e73335eba4ef35dd4bd7fcaf1d0ffedbb76f7c68cf35b6f9efb51eb4b6135ff2e20417a8da3b31f1f23e0ff0ceda8e280cce7b8df1e131bb800dc76c023e59b34dfb3f93cf20c8df017d0bb69162839fdac768fc1a560a723f"], &(0x7f00000017c0)=0x6) [ 767.951902] kobject: 'tx-0' (00000000d1eadf95): kobject_cleanup, parent 000000003d0c2e8f [ 767.972086] kobject: 'loop0' (00000000dcfe8576): kobject_uevent_env [ 767.993164] kobject: 'loop0' (00000000dcfe8576): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 768.055977] kobject: 'tx-0' (00000000d1eadf95): auto cleanup 'remove' event [ 768.118838] kobject: 'tx-0' (00000000d1eadf95): kobject_uevent_env [ 768.171303] kobject: 'tx-0' (00000000d1eadf95): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' 23:55:42 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e27, @remote}, 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x20d}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e21, 0x5, @local, 0x8}}, 0xbc1, 0x2}, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000300)={@broadcast, @multicast2}, &(0x7f0000000340)=0x8) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) 23:55:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a45323, &(0x7f0000000380)={{0x401, 0x1}, 'port1\x00', 0x32, 0x400, 0x7, 0x8, 0x8, 0x7c0a, 0x7, 0x0, 0x6, 0x7}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) [ 768.245181] kobject: 'tx-0' (00000000d1eadf95): auto cleanup kobject_del [ 768.256267] kobject: 'loop4' (0000000068356e70): kobject_uevent_env [ 768.265237] kobject: 'loop4' (0000000068356e70): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 768.281794] kobject: 'tx-0' (00000000d1eadf95): calling ktype release [ 768.291098] kobject: 'tx-0': free name [ 768.295037] kobject: 'queues' (000000003d0c2e8f): kobject_cleanup, parent (null) [ 768.303519] kobject: 'queues' (000000003d0c2e8f): calling ktype release [ 768.310422] kobject: 'queues' (000000003d0c2e8f): kset_release [ 768.315145] kobject: 'loop2' (000000008f24f2d2): kobject_uevent_env [ 768.323785] kobject: 'loop2' (000000008f24f2d2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 768.334079] kobject: 'queues': free name [ 768.338694] kobject: 'syz_tun' (0000000072fafc98): kobject_uevent_env 23:55:43 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000180)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) sendmsg$nl_generic(r0, &(0x7f0000001600)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000015c0)={&(0x7f00000004c0)={0x10c4, 0x39, 0x300, 0x70bd2b, 0x25dfdbfe, {0x10}, [@generic="51693abf242a00eedd3cc97a33f5f614da47f1e8540caed37f15ab452f3835b6e89e9e2d7fc12a6e7520d40062230400aa64237b299017235fbe4a04f8b10ae99748e4182ec4b9bed71ee8d0bdf2ebe2156e28c0f4c3218cf10a46b6e2964822192782f2f65de2c017bd7158ae8205efaeb82f16a219501d697e54f229acea0c55bf3817964b77f3a313f83dcf510392592870f5ad956c6c8ee8933d22e88bfcdbdf3323c2a9f29ef1d52aaec1c0c559dc44c6bdf3556b0a043fc061aace275d5b2d24b84bc8c48c98fdb93ac0bd54fda99d93bf60b95444634d7c857104cf004929cefdf8e0b1345f70d0638162463f8c6a18d1c47e36db5d21d4faa039cb0e3e4c80411ec299883951a77afc4054700ece0ee94f7ef8d9753667b6ba4df1962313c6cd095ee0d2698d32aa8c1a953cb1a366f67d5ba467c61fcc8a7e2604e11b155b726a6bd27fab4f7d6a2aeee03b220aca0fd230f65bd0ee76b7eef06daf24b5f83fcebf5f5d8db7878645a3cb31b713b98c1acb190e8378f217fd8d6679ae26520c6bad45b1d6bbc0df589b34f7b582545918ce214c7def560ddd308feaa519d0846184656a2526b57924e9ea4e1177f76ed24d842b6c6a0a4e9ca6969190be6b0a626913ae33faa1c730ae25e2c58db36ce49c55a504253f9e8102b1bc270a6a00c49d15c797ca549340119ab088c4a9b98bc7984cf83f9052dfb99eb22aa8a640cab0cf8b07a56b295440f92a28b69a2ad7309c441d38c3bc3265752d7b9dfd1033a22351356d0ef2bc82804c286e688e92bba47e34938dfb19146a8b71fae216bf9d614e0b03d4e367187c9ba7ab5699fa5577593c5d1c6097692c31a55dcaee39d21ed3989a69aaade40448f6159e4c4b7c93de7239fcb6bf7b5ab3d05640394e45398f2e5778543a018e10ded2a27c9c82d1a56f20bfb9916284cc40999b821dd28df96a65bf13ffc812a558cedac448821156746cdd97106c0b03769469eecbb50d9be8dec3b9d0a196444abfd40e23b3867d2d87ecca741abb7ba1fda54ab75b8ff9b9fd620ff084940be4970018953009a4af2a08777bcc0e758fbce76c627d668a2122ed5112a4137af7f1669a9535bbd3cbc70615f77b9e55574c6ee6f39cbd3542d773837987631fca0f5d5eca88e6879fb1f280f68b83c975f66c616e43ef03ee05f70e5d5f53f7f58acba794f578be6fe0fe741d3227bbe828ed755c93deb1aae4d718a0ebda3a00b3461a6d32ac940a005023f89f7b275bbce3a7ab2c4efc6ca4e388d154b80b57374cbe94f3acffaefbe2f77a3fe3a92639440de76f017df5ed8aeaa7719ea7d70aa96db3132d5ee7e11dae046d78365b500da884a7e09f0efcf2233bdb9ec3162f2083b9e5c39013daf6c146371b446b9dcc40bb69645c38ed674465a91270fdf557be18d9a70ce80f0b3f3f806e3a25b51c619cfb9b2fcb65a42c60651b1fec872bbab9e6a8d3f52c7189f8a836a33862fbc904a9e4efcd6c8f37c41d5e63e20bb852824941c25a8276f4862b438a2a350f21fbe0507e52f3453391903b0b8e1faff729078fe7427e57d6c8fc127ea09cca955863817f64db0a52b5165c4f728253c4a6f9d8fbe96ea00a7e151856d8fec47abc9183e10219f20ca678eba395c44a76634faa838ffa9ffd9d3be02a053a4d0c5bf541b80383df490ff7da8b557dd33e625fc83eda114d2154d3a34304a2f8e340d1e7c6f8518bca9208b56e4cf99d5924188652d80ab2b19e958f6f1957686fc8f374f2e88c2f31c2d548f9160e1969c28d0ed47df8a7f8a7ea76520a99787490a6d21172a8230b085126c708ff7a64e4ae520f9ba8fcb4996c6991b35675f670c68291b2b8e5412b8eed80630d701f7d8b261177ba3604527f98ff61885570ae1243fbc0bd9166791b3728222a4da552048500a85a6bc000a006cbc8768b12748f91b10a2fd06a7bdc76096f063760cb13374c476af102ce536cb49ce1694760642f1ad25cf21a91e134e265365c8e02a3182292f499e8982941619a0226b9b9525399898608fd5df133d6b4d1e1e201d3b4b19901f8fc7c36b3c2b342f330d240107322b12aee0c2e0ea3f64abc6615ec66f1c6487583690d30112b30a148857314f3f7bc93830657a0e6a66616fc6275f323edca84aa70a67e6e335b1b00d8c40b03c207e24e6a45914d5cb3062b88be04baf38f5627798088811815a8ff0cc44d600b8ecb3790372f7fc0d4da2fdc3357966ca8792c7946d2591e304d2c88e1e85effdfff9cae64f096f5b8466e4a551f2c0acbfdd1e7e8555cdd3e8ceaa1ed3450654c87cb261bbff352f33144f91d6386de7bb9c813b180af6c6bd03b09af0305b8d6a2b51f2cb74fc05433eb90a2268a9c48517846d56c5f187558576f53216a16d7282b79d335d08049f94fc1493a9518e05dd1f96f6fd3727f6639468353188da354ad13d886254506079929aa3cfae1c3bca8032584e7a1bac579f798cd680ab8541bfc54b0c6d676a604982ff7a4ed97b930bfe781a620f47272f2a42ef6a6cd1493a24b31d4ec079a7d60a102e515102836220d8996f0559647fd7084fc0c7e5ae92f2fefd57bb66ecd179217256abe4069cd20a649d72944a322502640239bda3c01c140e96737990fba96b66556a6d7a68624b6fa2f6e2dd6151d6791d52dd705220daf5d5b58a37198f3fdcff8620120388fac7349c8eaa10b7baf153fc4bde4570032e4bcdd8a4dc62fc07abfefdaf435b82c19d715c5e2fed49ee6472eafca937dfd8e89651baa5cf453c9c4819828cb7f9ffd460b5c6ede52fb45c5e84bd8ad7079dfdaaadf314d7ecf9a837ea522017f8d2207af4e68fd59c40f57d4de4e8a3807ea1dfd49c81c0fbb605da4a1ec453eb54ac8fc306057ebc9802bf6951621f2bd357702d77446a656c7f79eca90ca550ee516df376cbe701425973ffe356430b17fe1adbcab3364614b458102c4f660401a051cfff4412b860fe2fe4246c16d064db0ed25a6181574130ba7454be280307344823872d3c59a786c38f542ec187213ad369ab69419d85a212b545085ab8fc8730457af36e653095ec39a9258680f6d4823f7c6d462111bbeb8f0372b2a5a50140a0a122fae8ec059be8b8958254e22d21d8410371d00a8b244ff97b3e8d9dbcc164fbc989144b9164b4dbf438b72f1f17750558b42d9dac17fb15e8a2d1fe54aaae5e9e0508388702534c54eb9cf4e773a9bde0b24e36158a84c2423f6971f607555b81b3e79d13885cf1ac07a0e3694c14bf1a99181e16188c78f8691c630b5de3b1df899bfe36b4b4cdd69517b54ec1d796116fb6af6e953e8015ae917523aa626b34401cc6c039a9dfe19a7261791ab20972438d073a79b2e022e42132741235f184b470b1be11f3ae79614541c7ade009813d6abaf88956f175075ae6269447d98261916e4d97c15847f74800b7ee2d16e414e0cbec79e2d67b2feb1e6968cc61a17faa235b698f4f2f86b13c188ae1ac5a8e513e566316512ad0f207e90fff4992d9fafd5d6894922a5624635336f87e7b095613d1c186c854ef0febcbadb195cd13a57189e7f64095fbd12dcc3d5f8ab19a1ca42784b19697d7bd3a6633d1c99b3a90b2a900873e0a2218421857c20b2ad6f083e53d0ad9b9a5f785542f02f2a44a5d747caac6175ffff71a0da940f899cc8334361116e4e5df67382033a8576bbdb0ac2cac7a1723a62d43450836e43c200612a10a586e23ccff2ee14c20b7783edb9fb6a3db250f4eb788a2a1898a5bea10f03baabaf053da5f96afbb24abf0927fb42ef87cad34701f48f1025f0b1fc88645c65db400be4c08f85287dd6129ac75deebc09e5eed4b94c62d3bc33df2f8b0eaddcfce3d77328df5843c020ee8b425e7f1e5b73512b1f22ceb52ab589b305f9d0012bdacfcd352bb9398a1fbdce039ebf00b6aac4ed5e5d47dfb2a2edbee25615d18fb68f33b90e26e7cde72859a761230104d4728fcc9da5c4e84d54b6b351bd6f909f26c97cfc5137d438b843f1291e8aa090f1260c516acd9346bb6c1d7f99c67c0beca31fe5bc4bbf7ef0d91f50a46895d6bd082d44eabd9e19909b9e3c636b17ecc568d18235aaa63c8a813cd299afe0c0475d4b0587b05fb3b50905ce1a8431cc38e2ba1c2d696636903e7d857a4f06891856b8f9e688741461ba731de596d78825bd5f542f3636d935b2c9f468f603da59b20bd721314815fa4b6a3b058aeb0c1331e8e18d8533d47e273ba7f0cd17e47aebc7455a36445934c436f2e7158d73c3c6da828c1232c2dca2c9ead34d16af59434e40a99b0bf9600bdac2665d2e1d5dc39e44f4d3a6ccb9e861180daec682affb467a96d501938f0e6c8cc85566168281b04b2da5b8817bf365892847b8b245890fb130c1bfbce84da42f4537f625dee225c90b46e6ef17f6c4361e182b856aa9b5fca891436b9792a462c9f082ff5338dbd3a828da37cc39a6c9cd6bdef78fe6ecf307b1ca59e9fa897b256a5d7b5aa7d6a04878e08af85ae14c99c7e5a6cc37535bf6c278efd25872c0e78bbe55e60fca3bfc210eebcf3cc536e8ac3849c2879294a5b2a5799c3513f3050d7de61729a5faebe33dc098e70465a5423c3c00ffa9730ba61ed99320363f619b7c1c221fe532400c8103625cc079e16edf61bbc5bb6a92b203e3bf64072650af8d229419d3d36827711d932869c87f70431cf2170f0118b00685fb45f70ff40a929df5d7da9ebe57f6ef1ed26cecaa24c8b842a2a47e00585b423580ed368a532188807ab5c8ebbbe07d8aecec642ffbe2ba123c406ca8bde8d4adfa4dd907adcfbab924b8dce476786bc43ef3c864cdc5f58f20d5809891752eee7f8b63385d0b05c10be33e2bdbe9829cdb23a806c5fb4fa167f8406edbbe9cf616da7a1315d2d24aeb1d0fa6b64069c8f2a917297d627b5d1354b5f89b3a9e866d7928a1ff99feb2940ac73e4bef30fbd807ada3e6cec443632e2caa4b96f2ca9db61fead70e741ebb1bd6dc72dcae1711a6b18f67249573db19ccbbb520e3bdd67aa510b8f7051e1a19eba0c98b38968858701c5389e7d5a0f1f405b13c6c68fe646f526a7c564ddbf89c874c8585ac37ece7dc0bee0d89bd1c34d503b12ab454c4540137978c7e1c243090321b37e5ff6ac083a1037bcbceba5e64f6b4418964af53c25e193f7db18134404f8aa2bd0f125a88cd2f7eb5ff9f4fb1e509087a31cbbc1dcae347763f6b03255113f0225408b3abf10f508fd0bd14ffea98d2d0410a69dffcebd931c630048654cad692ba4cf8933e9b3c7cffe8c6a1ea21d8fb6d557207ac7db6b438e7fdddd3d306d82d37469380f728e49f87117809a5d92a84542d180062286b1a0376a48ad58e4dabea50e6d07edbac711712995561af078ad28d3d4dbd0ba43d1616edc9a1f01f820c62524802ba8db1afbe9d4643276daa7b5e7e9939a1107a9addd74272d5536d640ab18fa67d56f74e0443a52518a6e3764d835928102d6ef05d405706138675cea5c3e19952513a86b7e29316da9bec25bb7011c397959ea22386d614486af32d2ec3057a0c568db29ae547d586e8b41f06641b6b2456909e5da7a7d528dbe61d76e0e68226e91abd6b5c80934871108b9307cd798fca4499a9cfe06822bfbda53a65c1b7fd167133d9c26f2877d0df9454a562f9546034dbcc3c1956e617ef35b93fcca10cd689b9808e5202c28664916fa39e85b834c8ddb2ed628c42b44e2c5af313500390645a71516226cca42726fd66b8a2c8c7ca81bdc8", @generic="a1b1a1fb0b9fc81a1ff9f20fb12768285d98aaad61eb46b44f9778ed0a8d763e0075581e454c5e7d043f", @typed={0x8, 0x82, @pid=r1}, @generic="3d294c9406b5a8ee9beb463bab13613ac4e9001ade5ebbe6b76d6b2527806dccac62f45d410efaf898378793a7d4c3427d46ce628099405cc8e74f2a39e66bcc82bdd49cfc125228f4e272c4746158d28a7d9f3b", @typed={0x8, 0x40, @uid=r2}, @typed={0x8, 0x44, @uid=r3}, @generic="e2ab52832314184c428ddfd1a24324168f183c61b3ee15"]}, 0x10c4}, 0x1, 0x0, 0x0, 0x4000000}, 0xd1) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r4, 0x40086610, &(0x7f0000000040)=0x6f2f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r4, &(0x7f0000000200)) 23:55:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0xfffffffffffffd41) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000280)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) [ 768.347666] kobject: 'syz_tun' (0000000072fafc98): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 768.378297] kobject: 'loop3' (00000000f11ba32a): kobject_uevent_env [ 768.384784] kobject: 'loop3' (00000000f11ba32a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 768.398282] kobject: 'syz_tun' (0000000072fafc98): kobject_cleanup, parent (null) [ 768.412456] kobject: 'syz_tun' (0000000072fafc98): calling ktype release [ 768.431788] kobject: 'rx-0' (00000000c370159d): kobject_cleanup, parent 00000000798bb0fc [ 768.458414] kobject: 'syz_tun': free name [ 768.468386] kobject: 'loop4' (0000000068356e70): kobject_uevent_env [ 768.474856] kobject: 'loop4' (0000000068356e70): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 768.497679] kobject: 'rx-0' (00000000c370159d): auto cleanup 'remove' event [ 768.504831] kobject: 'rx-0' (00000000c370159d): kobject_uevent_env [ 768.527695] kobject: 'rx-0' (00000000c370159d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 768.558297] kobject: 'rx-0' (00000000c370159d): auto cleanup kobject_del [ 768.575581] kobject: 'rx-0' (00000000c370159d): calling ktype release [ 768.597716] kobject: 'rx-0': free name [ 768.601723] kobject: 'tx-0' (00000000dd1ec57e): kobject_cleanup, parent 00000000798bb0fc [ 768.621605] kobject: 'tx-0' (00000000dd1ec57e): auto cleanup 'remove' event [ 768.644233] kobject: 'loop1' (000000003e86b94a): kobject_uevent_env 23:55:43 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x1) write(r0, &(0x7f00000000c0)="f2", 0x1) [ 768.676505] kobject: 'loop1' (000000003e86b94a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 768.702951] kobject: 'tx-0' (00000000dd1ec57e): kobject_uevent_env [ 768.778813] kobject: 'tx-0' (00000000dd1ec57e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 768.789469] kobject: 'tx-0' (00000000dd1ec57e): auto cleanup kobject_del [ 768.796452] kobject: 'tx-0' (00000000dd1ec57e): calling ktype release [ 768.803789] kobject: 'tx-0': free name [ 768.818405] kobject: 'queues' (00000000798bb0fc): kobject_cleanup, parent (null) 23:55:43 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x1) write(r0, &(0x7f00000000c0)="f2", 0x1) [ 768.826846] kobject: 'queues' (00000000798bb0fc): calling ktype release [ 768.837170] kobject: 'queues' (00000000798bb0fc): kset_release [ 768.854421] kobject: 'queues': free name [ 768.859321] kobject: 'ip6gre0' (0000000076487f9c): kobject_uevent_env [ 768.865952] kobject: 'ip6gre0' (0000000076487f9c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 768.878086] kobject: 'rx-0' (00000000c85ef4a7): kobject_cleanup, parent 0000000079bef95b [ 768.886364] kobject: 'rx-0' (00000000c85ef4a7): auto cleanup 'remove' event [ 768.894195] kobject: 'rx-0' (00000000c85ef4a7): kobject_uevent_env [ 768.900928] kobject: 'rx-0' (00000000c85ef4a7): kobject_uevent_env: uevent_suppress caused the event to drop! 23:55:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) set_tid_address(&(0x7f0000000280)) r1 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) r2 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x7fffffff, 0x400) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f00000003c0)={0x10, 0x5}) [ 768.935733] kobject: 'rx-0' (00000000c85ef4a7): auto cleanup kobject_del [ 768.948085] kobject: 'loop2' (000000008f24f2d2): kobject_uevent_env [ 768.954811] kobject: 'loop2' (000000008f24f2d2): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:55:43 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:55:43 executing program 1: 23:55:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x40000, 0x0) ioctl$RTC_PLL_GET(r1, 0x801c7011, &(0x7f00000002c0)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, &(0x7f0000000280)=')eth0)#\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001780)={0x1, [0xfffffffffffffffc]}, &(0x7f00000017c0)=0x6) [ 768.984933] kobject: 'rx-0' (00000000c85ef4a7): calling ktype release 23:55:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000140)=0x2) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) [ 769.047691] kobject: 'rx-0': free name [ 769.051672] kobject: 'tx-0' (000000006e101b18): kobject_cleanup, parent 0000000079bef95b [ 769.084452] kobject: 'loop0' (00000000dcfe8576): kobject_uevent_env 23:55:43 executing program 1: [ 769.138137] kobject: 'loop0' (00000000dcfe8576): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 769.147663] kobject: 'tx-0' (000000006e101b18): auto cleanup 'remove' event [ 769.147678] kobject: 'tx-0' (000000006e101b18): kobject_uevent_env 23:55:43 executing program 1: [ 769.193337] kobject: 'tx-0' (000000006e101b18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 769.208873] IPVS: ftp: loaded support on port[0] = 21 [ 769.219552] kobject: 'loop4' (0000000068356e70): kobject_uevent_env [ 769.229613] kobject: 'tx-0' (000000006e101b18): auto cleanup kobject_del 23:55:43 executing program 1: [ 769.244695] kobject: 'tx-0' (000000006e101b18): calling ktype release [ 769.259647] kobject: 'loop4' (0000000068356e70): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 769.259662] kobject: 'tx-0': free name [ 769.284506] kobject: 'queues' (0000000079bef95b): kobject_cleanup, parent (null) [ 769.318166] kobject: 'queues' (0000000079bef95b): calling ktype release [ 769.334109] kobject: 'loop1' (000000003e86b94a): kobject_uevent_env [ 769.366811] kobject: 'loop1' (000000003e86b94a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 769.383339] kobject: 'queues' (0000000079bef95b): kset_release [ 769.403487] kobject: 'queues': free name [ 769.408953] kobject: 'loop1' (000000003e86b94a): kobject_uevent_env [ 769.410081] kobject: 'ip6gretap0' (00000000134d6012): kobject_uevent_env [ 769.422634] kobject: 'ip6gretap0' (00000000134d6012): kobject_uevent_env: uevent_suppress caused the event to drop! [ 769.441801] kobject: 'loop1' (000000003e86b94a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 769.445667] kobject: 'lo' (0000000000d13f94): kobject_add_internal: parent: 'net', set: 'devices' [ 769.477270] kobject: 'lo' (0000000000d13f94): kobject_uevent_env [ 769.483819] kobject: 'lo' (0000000000d13f94): fill_kobj_path: path = '/devices/virtual/net/lo' [ 769.494079] kobject: 'queues' (00000000203977e7): kobject_add_internal: parent: 'lo', set: '' [ 769.507725] kobject: 'queues' (00000000203977e7): kobject_uevent_env [ 769.514236] kobject: 'queues' (00000000203977e7): kobject_uevent_env: filter function caused the event to drop! [ 769.531745] kobject: 'rx-0' (000000001500cba7): kobject_add_internal: parent: 'queues', set: 'queues' [ 769.541662] kobject: 'rx-0' (000000001500cba7): kobject_uevent_env [ 769.548421] kobject: 'rx-0' (000000001500cba7): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 769.558907] kobject: 'tx-0' (000000006ccc4023): kobject_add_internal: parent: 'queues', set: 'queues' [ 769.569005] kobject: 'tx-0' (000000006ccc4023): kobject_uevent_env 23:55:44 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000100)={r1, 0xe7d}, 0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fstat(r2, &(0x7f0000000200)) 23:55:44 executing program 1: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0000ffffff7f00000000"], 0x1, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 23:55:44 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x1ff, 0x100) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000240)={0x4ea, 0x10000000000004, 0x7fff, 0x10040000}) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$KDMKTONE(r1, 0x4b30, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xac7, 0x400) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000140)) request_key(&(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0) [ 769.575426] kobject: 'tx-0' (000000006ccc4023): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 769.587025] kobject: 'ip6gre0' (0000000076487f9c): kobject_cleanup, parent (null) [ 769.596220] kobject: 'tunl0' (00000000b1ad35ab): kobject_add_internal: parent: 'net', set: 'devices' [ 769.605630] kobject: 'ip6gre0' (0000000076487f9c): auto cleanup 'remove' event [ 769.615958] kobject: 'loop3' (00000000f11ba32a): kobject_uevent_env [ 769.650146] kobject: 'tunl0' (00000000b1ad35ab): kobject_uevent_env [ 769.655431] kobject: 'ip6gre0' (0000000076487f9c): kobject_uevent_env [ 769.656638] kobject: 'tunl0' (00000000b1ad35ab): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 769.656743] kobject: 'queues' (000000009ae43d15): kobject_add_internal: parent: 'tunl0', set: '' [ 769.656778] kobject: 'queues' (000000009ae43d15): kobject_uevent_env [ 769.663950] kobject: 'ip6gre0' (0000000076487f9c): kobject_uevent_env: uevent_suppress caused the event to drop! 23:55:44 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r2}, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(r0) [ 769.675703] kobject: 'loop3' (00000000f11ba32a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 769.682765] kobject: 'ip6gre0' (0000000076487f9c): calling ktype release [ 769.682789] kobject: 'ip6gre0': free name [ 769.721282] kobject: 'queues' (000000009ae43d15): kobject_uevent_env: filter function caused the event to drop! [ 769.734578] kobject: 'loop1' (000000003e86b94a): kobject_uevent_env [ 769.773434] kobject: 'loop1' (000000003e86b94a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 769.801088] kobject: 'rx-0' (00000000e065e503): kobject_add_internal: parent: 'queues', set: 'queues' [ 769.814146] kobject: 'rx-0' (00000000e065e503): kobject_uevent_env [ 769.820956] kobject: 'rx-0' (00000000e065e503): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 769.831783] kobject: 'tx-0' (000000005723a6f7): kobject_add_internal: parent: 'queues', set: 'queues' [ 769.843414] kobject: 'tx-0' (000000005723a6f7): kobject_uevent_env [ 769.891664] kobject: 'tx-0' (000000005723a6f7): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' 23:55:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x1) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = accept4(r0, &(0x7f0000000380)=@ipx, &(0x7f0000000280)=0x80, 0x80800) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000400)={r0}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000440)=0x40, 0x1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x200}, 0x28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="ff8390ce39", 0x5, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r2) [ 769.969236] kobject: 'loop0' (00000000dcfe8576): kobject_uevent_env [ 769.975711] kobject: 'loop0' (00000000dcfe8576): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 769.992728] kobject: 'ip6gretap0' (00000000134d6012): kobject_cleanup, parent (null) [ 769.995699] kobject: 'gre0' (00000000e37b4225): kobject_add_internal: parent: 'net', set: 'devices' [ 770.033008] kobject: 'gre0' (00000000e37b4225): kobject_uevent_env [ 770.036107] kobject: 'ip6gretap0' (00000000134d6012): auto cleanup 'remove' event [ 770.049778] kobject: 'gre0' (00000000e37b4225): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 770.069057] kobject: 'loop2' (000000008f24f2d2): kobject_uevent_env [ 770.090447] kobject: 'ip6gretap0' (00000000134d6012): kobject_uevent_env [ 770.099062] kobject: 'queues' (00000000d1d2544a): kobject_add_internal: parent: 'gre0', set: '' [ 770.102082] kobject: 'loop2' (000000008f24f2d2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 770.132348] kobject: 'ip6gretap0' (00000000134d6012): kobject_uevent_env: uevent_suppress caused the event to drop! [ 770.153432] kobject: 'queues' (00000000d1d2544a): kobject_uevent_env [ 770.170716] kobject: 'queues' (00000000d1d2544a): kobject_uevent_env: filter function caused the event to drop! [ 770.181454] kobject: 'ip6gretap0' (00000000134d6012): calling ktype release [ 770.199172] kobject: 'ip6gretap0': free name [ 770.206299] kobject: 'rx-0' (0000000093430a77): kobject_add_internal: parent: 'queues', set: 'queues' [ 770.225185] kobject: 'rx-0' (0000000093430a77): kobject_uevent_env [ 770.241076] kobject: 'rx-0' (0000000093430a77): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 770.251833] kobject: 'tx-0' (0000000063dc1c33): kobject_add_internal: parent: 'queues', set: 'queues' [ 770.262205] kobject: 'tx-0' (0000000063dc1c33): kobject_uevent_env [ 770.268878] kobject: 'tx-0' (0000000063dc1c33): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 770.285192] kobject: 'rx-0' (000000002f0ce608): kobject_cleanup, parent 000000009e2352d3 [ 770.304378] kobject: 'rx-0' (000000002f0ce608): auto cleanup 'remove' event [ 770.321763] kobject: 'rx-0' (000000002f0ce608): kobject_uevent_env [ 770.335046] kobject: 'loop3' (00000000f11ba32a): kobject_uevent_env [ 770.342750] kobject: 'loop3' (00000000f11ba32a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 770.355208] kobject: 'rx-0' (000000002f0ce608): kobject_uevent_env: uevent_suppress caused the event to drop! [ 770.372879] kobject: 'rx-0' (000000002f0ce608): auto cleanup kobject_del [ 770.388015] kobject: 'rx-0' (000000002f0ce608): calling ktype release [ 770.398847] kobject: 'rx-0': free name [ 770.402938] kobject: 'tx-0' (000000004031929d): kobject_cleanup, parent 000000009e2352d3 [ 770.411743] kobject: 'tx-0' (000000004031929d): auto cleanup 'remove' event [ 770.419258] kobject: 'tx-0' (000000004031929d): kobject_uevent_env [ 770.425692] kobject: 'tx-0' (000000004031929d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 770.436293] kobject: 'tx-0' (000000004031929d): auto cleanup kobject_del [ 770.448382] kobject: 'tx-0' (000000004031929d): calling ktype release [ 770.458355] kobject: 'tx-0': free name [ 770.462406] kobject: 'queues' (000000009e2352d3): kobject_cleanup, parent (null) [ 770.471295] kobject: 'queues' (000000009e2352d3): calling ktype release [ 770.478453] kobject: 'queues' (000000009e2352d3): kset_release [ 770.484569] kobject: 'queues': free name [ 770.489529] kobject: 'ip6tnl0' (000000007aaeb73a): kobject_uevent_env [ 770.496269] kobject: 'ip6tnl0' (000000007aaeb73a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 770.524884] kobject: 'gretap0' (000000007096669c): kobject_add_internal: parent: 'net', set: 'devices' [ 770.535538] kobject: 'gretap0' (000000007096669c): kobject_uevent_env [ 770.542298] kobject: 'gretap0' (000000007096669c): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 770.552192] kobject: 'queues' (000000009ab01f12): kobject_add_internal: parent: 'gretap0', set: '' [ 770.562088] kobject: 'queues' (000000009ab01f12): kobject_uevent_env [ 770.568719] kobject: 'queues' (000000009ab01f12): kobject_uevent_env: filter function caused the event to drop! [ 770.579114] kobject: 'rx-0' (000000007bb3fba7): kobject_add_internal: parent: 'queues', set: 'queues' [ 770.588720] kobject: 'rx-0' (000000007bb3fba7): kobject_uevent_env [ 770.595224] kobject: 'rx-0' (000000007bb3fba7): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 770.605869] kobject: 'tx-0' (00000000cd103d10): kobject_add_internal: parent: 'queues', set: 'queues' [ 770.615568] kobject: 'tx-0' (00000000cd103d10): kobject_uevent_env [ 770.622046] kobject: 'tx-0' (00000000cd103d10): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 770.633543] kobject: 'ip6tnl0' (000000007aaeb73a): kobject_cleanup, parent (null) [ 770.643395] kobject: 'erspan0' (000000000c3351e2): kobject_add_internal: parent: 'net', set: 'devices' [ 770.653607] kobject: 'ip6tnl0' (000000007aaeb73a): auto cleanup 'remove' event [ 770.662044] kobject: 'erspan0' (000000000c3351e2): kobject_uevent_env [ 770.668770] kobject: 'ip6tnl0' (000000007aaeb73a): kobject_uevent_env [ 770.675446] kobject: 'ip6tnl0' (000000007aaeb73a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 770.686010] kobject: 'erspan0' (000000000c3351e2): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 770.695930] kobject: 'queues' (00000000080c6a64): kobject_add_internal: parent: 'erspan0', set: '' [ 770.705696] kobject: 'ip6tnl0' (000000007aaeb73a): calling ktype release [ 770.712680] kobject: 'ip6tnl0': free name [ 770.716948] kobject: 'queues' (00000000080c6a64): kobject_uevent_env [ 770.723642] kobject: 'queues' (00000000080c6a64): kobject_uevent_env: filter function caused the event to drop! [ 770.734028] kobject: 'rx-0' (00000000365e0bd8): kobject_add_internal: parent: 'queues', set: 'queues' [ 770.743569] kobject: 'rx-0' (00000000365e0bd8): kobject_uevent_env [ 770.750062] kobject: 'rx-0' (00000000365e0bd8): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 770.760676] kobject: 'tx-0' (0000000017aee5f9): kobject_add_internal: parent: 'queues', set: 'queues' [ 770.770342] kobject: 'tx-0' (0000000017aee5f9): kobject_uevent_env [ 770.776775] kobject: 'tx-0' (0000000017aee5f9): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 770.829572] kobject: 'rx-0' (000000003655c7ff): kobject_cleanup, parent 000000005ef42959 [ 770.837980] kobject: 'rx-0' (000000003655c7ff): auto cleanup 'remove' event [ 770.845225] kobject: 'rx-0' (000000003655c7ff): kobject_uevent_env [ 770.852063] kobject: 'rx-0' (000000003655c7ff): kobject_uevent_env: uevent_suppress caused the event to drop! [ 770.862506] kobject: 'rx-0' (000000003655c7ff): auto cleanup kobject_del [ 770.869778] kobject: 'rx-0' (000000003655c7ff): calling ktype release [ 770.876488] kobject: 'rx-0': free name [ 770.880793] kobject: 'tx-0' (0000000044d0421d): kobject_cleanup, parent 000000005ef42959 [ 770.889444] kobject: 'tx-0' (0000000044d0421d): auto cleanup 'remove' event [ 770.896684] kobject: 'tx-0' (0000000044d0421d): kobject_uevent_env [ 770.903424] kobject: 'tx-0' (0000000044d0421d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 770.913920] kobject: 'tx-0' (0000000044d0421d): auto cleanup kobject_del [ 770.921154] kobject: 'tx-0' (0000000044d0421d): calling ktype release [ 770.928135] kobject: 'tx-0': free name [ 770.932162] kobject: 'queues' (000000005ef42959): kobject_cleanup, parent (null) [ 770.941036] kobject: 'queues' (000000005ef42959): calling ktype release [ 770.948215] kobject: 'queues' (000000005ef42959): kset_release [ 770.954307] kobject: 'queues': free name [ 770.959681] kobject: 'sit0' (0000000035763c65): kobject_uevent_env [ 770.966145] kobject: 'sit0' (0000000035763c65): kobject_uevent_env: uevent_suppress caused the event to drop! [ 770.978355] kobject: 'ip_vti0' (00000000a28775a5): kobject_add_internal: parent: 'net', set: 'devices' [ 770.990953] kobject: 'ip_vti0' (00000000a28775a5): kobject_uevent_env [ 770.998022] kobject: 'ip_vti0' (00000000a28775a5): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 771.008287] kobject: 'queues' (000000006b37af29): kobject_add_internal: parent: 'ip_vti0', set: '' [ 771.018449] kobject: 'queues' (000000006b37af29): kobject_uevent_env [ 771.025385] kobject: 'queues' (000000006b37af29): kobject_uevent_env: filter function caused the event to drop! [ 771.036285] kobject: 'rx-0' (00000000f11a5068): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.046272] kobject: 'rx-0' (00000000f11a5068): kobject_uevent_env [ 771.053102] kobject: 'rx-0' (00000000f11a5068): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 771.064168] kobject: 'tx-0' (00000000a1a62511): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.074244] kobject: 'tx-0' (00000000a1a62511): kobject_uevent_env [ 771.081082] kobject: 'tx-0' (00000000a1a62511): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 771.094145] kobject: 'ip6_vti0' (00000000f75d20c4): kobject_add_internal: parent: 'net', set: 'devices' [ 771.105655] kobject: 'ip6_vti0' (00000000f75d20c4): kobject_uevent_env [ 771.112491] kobject: 'ip6_vti0' (00000000f75d20c4): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 771.123039] kobject: 'queues' (000000005860ee38): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 771.132960] kobject: 'queues' (000000005860ee38): kobject_uevent_env [ 771.139560] kobject: 'queues' (000000005860ee38): kobject_uevent_env: filter function caused the event to drop! [ 771.149953] kobject: 'rx-0' (00000000379ad241): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.159512] kobject: 'rx-0' (00000000379ad241): kobject_uevent_env [ 771.165967] kobject: 'rx-0' (00000000379ad241): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 771.177413] kobject: 'tx-0' (000000006401632a): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.187233] kobject: 'tx-0' (000000006401632a): kobject_uevent_env [ 771.193852] kobject: 'tx-0' (000000006401632a): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 771.201510] kobject: 'loop4' (0000000068356e70): kobject_uevent_env [ 771.205398] kobject: 'sit0' (0000000035763c65): kobject_cleanup, parent (null) [ 771.215236] kobject: 'loop4' (0000000068356e70): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 771.219455] kobject: 'sit0' (000000005079283b): kobject_add_internal: parent: 'net', set: 'devices' [ 771.238326] kobject: 'sit0' (0000000035763c65): auto cleanup 'remove' event [ 771.240328] kobject: 'sit0' (000000005079283b): kobject_uevent_env [ 771.246850] kobject: 'sit0' (0000000035763c65): kobject_uevent_env [ 771.253600] kobject: 'sit0' (000000005079283b): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 771.261162] kobject: 'sit0' (0000000035763c65): kobject_uevent_env: uevent_suppress caused the event to drop! [ 771.268703] kobject: 'queues' (0000000077779746): kobject_add_internal: parent: 'sit0', set: '' [ 771.277660] kobject: 'sit0' (0000000035763c65): calling ktype release [ 771.287399] kobject: 'queues' (0000000077779746): kobject_uevent_env [ 771.295526] kobject: 'sit0': free name [ 771.304067] kobject: 'queues' (0000000077779746): kobject_uevent_env: filter function caused the event to drop! [ 771.314713] kobject: 'rx-0' (00000000ebaae196): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.324189] kobject: 'rx-0' (00000000ebaae196): kobject_uevent_env [ 771.331210] kobject: 'rx-0' (00000000ebaae196): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 771.341527] kobject: 'tx-0' (00000000b3658af6): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.351037] kobject: 'tx-0' (00000000b3658af6): kobject_uevent_env [ 771.357373] kobject: 'tx-0' (00000000b3658af6): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 771.371127] kobject: 'rx-0' (00000000561d7944): kobject_cleanup, parent 0000000054c32ac1 [ 771.379388] kobject: 'rx-0' (00000000561d7944): auto cleanup 'remove' event [ 771.386486] kobject: 'rx-0' (00000000561d7944): kobject_uevent_env [ 771.392849] kobject: 'rx-0' (00000000561d7944): kobject_uevent_env: uevent_suppress caused the event to drop! [ 771.403017] kobject: 'rx-0' (00000000561d7944): auto cleanup kobject_del [ 771.409955] kobject: 'rx-0' (00000000561d7944): calling ktype release [ 771.416545] kobject: 'rx-0': free name [ 771.420688] kobject: 'tx-0' (000000004393edc0): kobject_cleanup, parent 0000000054c32ac1 [ 771.428964] kobject: 'tx-0' (000000004393edc0): auto cleanup 'remove' event [ 771.436070] kobject: 'tx-0' (000000004393edc0): kobject_uevent_env [ 771.442416] kobject: 'tx-0' (000000004393edc0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 771.452515] kobject: 'tx-0' (000000004393edc0): auto cleanup kobject_del [ 771.459434] kobject: 'tx-0' (000000004393edc0): calling ktype release [ 771.466022] kobject: 'tx-0': free name [ 771.469984] kobject: 'queues' (0000000054c32ac1): kobject_cleanup, parent (null) [ 771.478471] kobject: 'queues' (0000000054c32ac1): calling ktype release [ 771.485217] kobject: 'queues' (0000000054c32ac1): kset_release [ 771.491236] kobject: 'queues': free name [ 771.495555] kobject: 'ip6_vti0' (0000000071fe0723): kobject_uevent_env [ 771.502253] kobject: 'ip6_vti0' (0000000071fe0723): kobject_uevent_env: uevent_suppress caused the event to drop! [ 771.512988] kobject: 'ip6tnl0' (00000000194b4eaf): kobject_add_internal: parent: 'net', set: 'devices' [ 771.523126] kobject: 'ip6tnl0' (00000000194b4eaf): kobject_uevent_env [ 771.530213] kobject: 'ip6tnl0' (00000000194b4eaf): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 771.539977] kobject: 'queues' (00000000035f0ac7): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 771.549681] kobject: 'queues' (00000000035f0ac7): kobject_uevent_env [ 771.556177] kobject: 'queues' (00000000035f0ac7): kobject_uevent_env: filter function caused the event to drop! [ 771.566464] kobject: 'rx-0' (00000000bf03a0d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.576236] kobject: 'rx-0' (00000000bf03a0d8): kobject_uevent_env [ 771.582636] kobject: 'rx-0' (00000000bf03a0d8): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 771.593285] kobject: 'tx-0' (00000000d04620e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.602872] kobject: 'tx-0' (00000000d04620e9): kobject_uevent_env [ 771.609283] kobject: 'tx-0' (00000000d04620e9): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 771.620728] kobject: 'ip6_vti0' (0000000071fe0723): kobject_cleanup, parent (null) [ 771.620855] kobject: 'ip6gre0' (00000000e42f6b9a): kobject_add_internal: parent: 'net', set: 'devices' [ 771.629790] kobject: 'ip6_vti0' (0000000071fe0723): auto cleanup 'remove' event [ 771.639827] kobject: 'ip6gre0' (00000000e42f6b9a): kobject_uevent_env [ 771.646944] kobject: 'ip6_vti0' (0000000071fe0723): kobject_uevent_env [ 771.653151] kobject: 'ip6gre0' (00000000e42f6b9a): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 771.660269] kobject: 'ip6_vti0' (0000000071fe0723): kobject_uevent_env: uevent_suppress caused the event to drop! [ 771.669652] kobject: 'queues' (000000008aaf5195): kobject_add_internal: parent: 'ip6gre0', set: '' [ 771.680390] kobject: 'ip6_vti0' (0000000071fe0723): calling ktype release [ 771.690249] kobject: 'queues' (000000008aaf5195): kobject_uevent_env [ 771.696925] kobject: 'ip6_vti0': free name [ 771.703136] kobject: 'queues' (000000008aaf5195): kobject_uevent_env: filter function caused the event to drop! [ 771.717970] kobject: 'rx-0' (00000000ad455e5b): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.727391] kobject: 'rx-0' (00000000ad455e5b): kobject_uevent_env [ 771.733801] kobject: 'rx-0' (00000000ad455e5b): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 771.744305] kobject: 'tx-0' (00000000c03dbebb): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.754252] kobject: 'tx-0' (00000000c03dbebb): kobject_uevent_env [ 771.760665] kobject: 'tx-0' (00000000c03dbebb): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 771.773723] kobject: 'rx-0' (00000000d115a4ae): kobject_cleanup, parent 00000000c295897f [ 771.782044] kobject: 'rx-0' (00000000d115a4ae): auto cleanup 'remove' event [ 771.789177] kobject: 'rx-0' (00000000d115a4ae): kobject_uevent_env [ 771.795502] kobject: 'rx-0' (00000000d115a4ae): kobject_uevent_env: uevent_suppress caused the event to drop! [ 771.805599] kobject: 'rx-0' (00000000d115a4ae): auto cleanup kobject_del [ 771.812488] kobject: 'rx-0' (00000000d115a4ae): calling ktype release [ 771.819098] kobject: 'rx-0': free name [ 771.823041] kobject: 'tx-0' (00000000f3b2e4af): kobject_cleanup, parent 00000000c295897f [ 771.831307] kobject: 'tx-0' (00000000f3b2e4af): auto cleanup 'remove' event [ 771.838427] kobject: 'tx-0' (00000000f3b2e4af): kobject_uevent_env [ 771.844730] kobject: 'tx-0' (00000000f3b2e4af): kobject_uevent_env: uevent_suppress caused the event to drop! [ 771.854808] kobject: 'tx-0' (00000000f3b2e4af): auto cleanup kobject_del [ 771.861700] kobject: 'tx-0' (00000000f3b2e4af): calling ktype release [ 771.868309] kobject: 'tx-0': free name [ 771.872218] kobject: 'queues' (00000000c295897f): kobject_cleanup, parent (null) [ 771.880649] kobject: 'queues' (00000000c295897f): calling ktype release [ 771.887400] kobject: 'queues' (00000000c295897f): kset_release [ 771.893405] kobject: 'queues': free name [ 771.897880] kobject: 'ip_vti0' (00000000683c67e7): kobject_uevent_env [ 771.904471] kobject: 'ip_vti0' (00000000683c67e7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 771.915478] kobject: 'syz_tun' (00000000414ab7b1): kobject_add_internal: parent: 'net', set: 'devices' [ 771.925559] kobject: 'syz_tun' (00000000414ab7b1): kobject_uevent_env [ 771.932231] kobject: 'syz_tun' (00000000414ab7b1): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 771.941965] kobject: 'queues' (0000000056c8d30a): kobject_add_internal: parent: 'syz_tun', set: '' [ 771.951661] kobject: 'queues' (0000000056c8d30a): kobject_uevent_env [ 771.958177] kobject: 'queues' (0000000056c8d30a): kobject_uevent_env: filter function caused the event to drop! [ 771.968918] kobject: 'rx-0' (000000004221d006): kobject_add_internal: parent: 'queues', set: 'queues' [ 771.978402] kobject: 'rx-0' (000000004221d006): kobject_uevent_env [ 771.984794] kobject: 'rx-0' (000000004221d006): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 771.995338] kobject: 'tx-0' (00000000ebbe92e1): kobject_add_internal: parent: 'queues', set: 'queues' [ 772.004875] kobject: 'tx-0' (00000000ebbe92e1): kobject_uevent_env [ 772.011280] kobject: 'tx-0' (00000000ebbe92e1): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 772.022352] kobject: 'ip_vti0' (00000000683c67e7): kobject_cleanup, parent (null) [ 772.031276] kobject: 'ip_vti0' (00000000683c67e7): auto cleanup 'remove' event [ 772.039019] kobject: 'ip_vti0' (00000000683c67e7): kobject_uevent_env [ 772.045691] kobject: 'ip_vti0' (00000000683c67e7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.056678] kobject: 'ip_vti0' (00000000683c67e7): calling ktype release [ 772.063851] kobject: 'ip_vti0': free name [ 772.071428] kobject: 'rx-0' (0000000039da084d): kobject_cleanup, parent 00000000031092c9 [ 772.080245] kobject: 'rx-0' (0000000039da084d): auto cleanup 'remove' event [ 772.087448] kobject: 'rx-0' (0000000039da084d): kobject_uevent_env [ 772.094337] kobject: 'rx-0' (0000000039da084d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.104749] kobject: 'rx-0' (0000000039da084d): auto cleanup kobject_del [ 772.111873] kobject: 'rx-0' (0000000039da084d): calling ktype release [ 772.118858] kobject: 'rx-0': free name [ 772.122791] kobject: 'tx-0' (0000000025245754): kobject_cleanup, parent 00000000031092c9 [ 772.131065] kobject: 'tx-0' (0000000025245754): auto cleanup 'remove' event [ 772.138208] kobject: 'tx-0' (0000000025245754): kobject_uevent_env [ 772.144523] kobject: 'tx-0' (0000000025245754): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.154695] kobject: 'tx-0' (0000000025245754): auto cleanup kobject_del [ 772.161627] kobject: 'tx-0' (0000000025245754): calling ktype release [ 772.168244] kobject: 'tx-0': free name [ 772.172148] kobject: 'queues' (00000000031092c9): kobject_cleanup, parent (null) [ 772.180577] kobject: 'queues' (00000000031092c9): calling ktype release [ 772.187327] kobject: 'queues' (00000000031092c9): kset_release [ 772.193382] kobject: 'queues': free name [ 772.197792] kobject: 'erspan0' (000000004265f96a): kobject_uevent_env [ 772.204377] kobject: 'erspan0' (000000004265f96a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.237702] kobject: 'erspan0' (000000004265f96a): kobject_cleanup, parent (null) [ 772.246322] kobject: 'erspan0' (000000004265f96a): auto cleanup 'remove' event [ 772.253831] kobject: 'erspan0' (000000004265f96a): kobject_uevent_env [ 772.260663] kobject: 'erspan0' (000000004265f96a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.271143] kobject: 'erspan0' (000000004265f96a): calling ktype release [ 772.278195] kobject: 'erspan0': free name [ 772.285390] kobject: 'rx-0' (00000000cd114e00): kobject_cleanup, parent 000000004cb9bdf0 [ 772.293781] kobject: 'rx-0' (00000000cd114e00): auto cleanup 'remove' event [ 772.300971] kobject: 'rx-0' (00000000cd114e00): kobject_uevent_env [ 772.307282] kobject: 'rx-0' (00000000cd114e00): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.317413] kobject: 'rx-0' (00000000cd114e00): auto cleanup kobject_del [ 772.324334] kobject: 'rx-0' (00000000cd114e00): calling ktype release [ 772.331386] kobject: 'rx-0': free name [ 772.335301] kobject: 'tx-0' (00000000c36640a7): kobject_cleanup, parent 000000004cb9bdf0 [ 772.343570] kobject: 'tx-0' (00000000c36640a7): auto cleanup 'remove' event [ 772.350701] kobject: 'tx-0' (00000000c36640a7): kobject_uevent_env [ 772.357012] kobject: 'tx-0' (00000000c36640a7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.367124] kobject: 'tx-0' (00000000c36640a7): auto cleanup kobject_del [ 772.374058] kobject: 'tx-0' (00000000c36640a7): calling ktype release [ 772.380658] kobject: 'tx-0': free name [ 772.384562] kobject: 'queues' (000000004cb9bdf0): kobject_cleanup, parent (null) [ 772.393004] kobject: 'queues' (000000004cb9bdf0): calling ktype release [ 772.399785] kobject: 'queues' (000000004cb9bdf0): kset_release [ 772.405745] kobject: 'queues': free name [ 772.410185] kobject: 'gretap0' (000000006936bb3b): kobject_uevent_env [ 772.416755] kobject: 'gretap0' (000000006936bb3b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.457715] kobject: 'gretap0' (000000006936bb3b): kobject_cleanup, parent (null) [ 772.466336] kobject: 'gretap0' (000000006936bb3b): auto cleanup 'remove' event [ 772.474185] kobject: 'gretap0' (000000006936bb3b): kobject_uevent_env [ 772.481134] kobject: 'gretap0' (000000006936bb3b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.491677] kobject: 'gretap0' (000000006936bb3b): calling ktype release [ 772.498743] kobject: 'gretap0': free name [ 772.504499] kobject: 'rx-0' (000000004575b3f3): kobject_cleanup, parent 000000008893369b [ 772.512809] kobject: 'rx-0' (000000004575b3f3): auto cleanup 'remove' event [ 772.519945] kobject: 'rx-0' (000000004575b3f3): kobject_uevent_env [ 772.526252] kobject: 'rx-0' (000000004575b3f3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.536375] kobject: 'rx-0' (000000004575b3f3): auto cleanup kobject_del [ 772.543280] kobject: 'rx-0' (000000004575b3f3): calling ktype release [ 772.550544] kobject: 'rx-0': free name [ 772.554461] kobject: 'tx-0' (0000000057f3e4bb): kobject_cleanup, parent 000000008893369b [ 772.562747] kobject: 'tx-0' (0000000057f3e4bb): auto cleanup 'remove' event [ 772.569957] kobject: 'tx-0' (0000000057f3e4bb): kobject_uevent_env [ 772.576310] kobject: 'tx-0' (0000000057f3e4bb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.586449] kobject: 'tx-0' (0000000057f3e4bb): auto cleanup kobject_del [ 772.593352] kobject: 'tx-0' (0000000057f3e4bb): calling ktype release [ 772.599958] kobject: 'tx-0': free name [ 772.603866] kobject: 'queues' (000000008893369b): kobject_cleanup, parent (null) [ 772.612299] kobject: 'queues' (000000008893369b): calling ktype release [ 772.619091] kobject: 'queues' (000000008893369b): kset_release [ 772.625053] kobject: 'queues': free name [ 772.629537] kobject: 'gre0' (0000000050b0ed3b): kobject_uevent_env [ 772.635850] kobject: 'gre0' (0000000050b0ed3b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.646688] kobject: 'ip6gretap0' (00000000ad5411fe): kobject_add_internal: parent: 'net', set: 'devices' [ 772.657045] kobject: 'ip6gretap0' (00000000ad5411fe): kobject_uevent_env [ 772.664309] kobject: 'ip6gretap0' (00000000ad5411fe): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 772.674606] kobject: 'queues' (00000000ca35ecdc): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 772.684540] kobject: 'queues' (00000000ca35ecdc): kobject_uevent_env [ 772.691068] kobject: 'queues' (00000000ca35ecdc): kobject_uevent_env: filter function caused the event to drop! [ 772.701334] kobject: 'rx-0' (000000005fd3be91): kobject_add_internal: parent: 'queues', set: 'queues' [ 772.710794] kobject: 'rx-0' (000000005fd3be91): kobject_uevent_env [ 772.717136] kobject: 'rx-0' (000000005fd3be91): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 772.727937] kobject: 'tx-0' (0000000071338a6e): kobject_add_internal: parent: 'queues', set: 'queues' [ 772.737416] kobject: 'tx-0' (0000000071338a6e): kobject_uevent_env [ 772.743822] kobject: 'tx-0' (0000000071338a6e): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 772.767722] kobject: 'gre0' (0000000050b0ed3b): kobject_cleanup, parent (null) [ 772.776111] kobject: 'gre0' (0000000050b0ed3b): auto cleanup 'remove' event [ 772.777185] kobject: 'bridge0' (00000000f27b5b4a): kobject_add_internal: parent: 'net', set: 'devices' [ 772.783331] kobject: 'gre0' (0000000050b0ed3b): kobject_uevent_env [ 772.794143] kobject: 'bridge0' (00000000f27b5b4a): kobject_uevent_env [ 772.799364] kobject: 'gre0' (0000000050b0ed3b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.806518] kobject: 'bridge0' (00000000f27b5b4a): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 772.816074] kobject: 'gre0' (0000000050b0ed3b): calling ktype release [ 772.826486] kobject: 'queues' (00000000ae7bbe7d): kobject_add_internal: parent: 'bridge0', set: '' [ 772.832571] kobject: 'gre0': free name [ 772.846176] kobject: 'queues' (00000000ae7bbe7d): kobject_uevent_env [ 772.852717] kobject: 'queues' (00000000ae7bbe7d): kobject_uevent_env: filter function caused the event to drop! [ 772.863009] kobject: 'rx-0' (0000000026e90d30): kobject_add_internal: parent: 'queues', set: 'queues' [ 772.872467] kobject: 'rx-0' (0000000026e90d30): kobject_uevent_env [ 772.878834] kobject: 'rx-0' (0000000026e90d30): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 772.889361] kobject: 'tx-0' (000000009cfdc600): kobject_add_internal: parent: 'queues', set: 'queues' [ 772.899181] kobject: 'tx-0' (000000009cfdc600): kobject_uevent_env [ 772.905520] kobject: 'tx-0' (000000009cfdc600): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 772.916980] kobject: 'brif' (000000001035a0b5): kobject_add_internal: parent: 'bridge0', set: '' [ 772.929550] kobject: 'rx-0' (00000000bed3dc74): kobject_cleanup, parent 00000000d787ecf3 [ 772.937917] kobject: 'rx-0' (00000000bed3dc74): auto cleanup 'remove' event [ 772.945123] kobject: 'rx-0' (00000000bed3dc74): kobject_uevent_env [ 772.951864] kobject: 'rx-0' (00000000bed3dc74): kobject_uevent_env: uevent_suppress caused the event to drop! [ 772.962716] kobject: 'rx-0' (00000000bed3dc74): auto cleanup kobject_del [ 772.969704] kobject: 'rx-0' (00000000bed3dc74): calling ktype release [ 772.976468] kobject: 'rx-0': free name [ 772.980659] kobject: 'tx-0' (00000000131c4f3a): kobject_cleanup, parent 00000000d787ecf3 [ 772.988933] kobject: 'tx-0' (00000000131c4f3a): auto cleanup 'remove' event [ 772.996060] kobject: 'tx-0' (00000000131c4f3a): kobject_uevent_env [ 773.002405] kobject: 'tx-0' (00000000131c4f3a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 773.012476] kobject: 'tx-0' (00000000131c4f3a): auto cleanup kobject_del [ 773.019391] kobject: 'tx-0' (00000000131c4f3a): calling ktype release [ 773.025969] kobject: 'tx-0': free name [ 773.029918] kobject: 'queues' (00000000d787ecf3): kobject_cleanup, parent (null) [ 773.038346] kobject: 'queues' (00000000d787ecf3): calling ktype release [ 773.045170] kobject: 'queues' (00000000d787ecf3): kset_release [ 773.051273] kobject: 'queues': free name [ 773.055586] kobject: 'tunl0' (000000002a85eca6): kobject_uevent_env [ 773.062030] kobject: 'tunl0' (000000002a85eca6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 773.073306] kobject: 'vcan0' (00000000488f73fd): kobject_add_internal: parent: 'net', set: 'devices' [ 773.083160] kobject: 'vcan0' (00000000488f73fd): kobject_uevent_env [ 773.089680] kobject: 'vcan0' (00000000488f73fd): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 773.099075] kobject: 'queues' (00000000dfe539a3): kobject_add_internal: parent: 'vcan0', set: '' [ 773.109245] kobject: 'queues' (00000000dfe539a3): kobject_uevent_env [ 773.115734] kobject: 'queues' (00000000dfe539a3): kobject_uevent_env: filter function caused the event to drop! [ 773.126041] kobject: 'rx-0' (00000000ea79447f): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.135772] kobject: 'rx-0' (00000000ea79447f): kobject_uevent_env [ 773.142172] kobject: 'rx-0' (00000000ea79447f): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 773.152607] kobject: 'tx-0' (00000000e540acb9): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.162195] kobject: 'tx-0' (00000000e540acb9): kobject_uevent_env [ 773.168571] kobject: 'tx-0' (00000000e540acb9): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 773.179297] kobject: 'tunl0' (000000002a85eca6): kobject_cleanup, parent (null) [ 773.187819] kobject: 'tunl0' (000000002a85eca6): auto cleanup 'remove' event [ 773.195019] kobject: 'tunl0' (000000002a85eca6): kobject_uevent_env [ 773.201879] kobject: 'tunl0' (000000002a85eca6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 773.210730] kobject: 'bond0' (00000000c91f7b3f): kobject_add_internal: parent: 'net', set: 'devices' [ 773.212338] kobject: 'tunl0' (000000002a85eca6): calling ktype release [ 773.223126] kobject: 'bond0' (00000000c91f7b3f): kobject_uevent_env [ 773.228416] kobject: 'tunl0': free name [ 773.234478] kobject: 'bond0' (00000000c91f7b3f): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 773.247922] kobject: 'queues' (0000000091087047): kobject_add_internal: parent: 'bond0', set: '' [ 773.257417] kobject: 'queues' (0000000091087047): kobject_uevent_env [ 773.264421] kobject: 'queues' (0000000091087047): kobject_uevent_env: filter function caused the event to drop! [ 773.274732] kobject: 'rx-0' (000000000dbfadef): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.284187] kobject: 'rx-0' (000000000dbfadef): kobject_uevent_env [ 773.290565] kobject: 'rx-0' (000000000dbfadef): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 773.300902] kobject: 'rx-1' (00000000103ec929): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.310367] kobject: 'rx-1' (00000000103ec929): kobject_uevent_env [ 773.316706] kobject: 'rx-1' (00000000103ec929): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 773.327073] kobject: 'rx-2' (00000000e797548e): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.336517] kobject: 'rx-2' (00000000e797548e): kobject_uevent_env [ 773.342905] kobject: 'rx-2' (00000000e797548e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 773.353297] kobject: 'rx-3' (00000000607e6d3d): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.362782] kobject: 'rx-3' (00000000607e6d3d): kobject_uevent_env [ 773.369182] kobject: 'rx-3' (00000000607e6d3d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 773.379543] kobject: 'rx-4' (00000000ebebaf41): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.389306] kobject: 'rx-4' (00000000ebebaf41): kobject_uevent_env [ 773.395641] kobject: 'rx-4' (00000000ebebaf41): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 773.406014] kobject: 'rx-5' (0000000040461ef7): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.415455] kobject: 'rx-5' (0000000040461ef7): kobject_uevent_env [ 773.421853] kobject: 'rx-5' (0000000040461ef7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 773.432194] kobject: 'rx-6' (00000000ae12ca18): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.441648] kobject: 'rx-6' (00000000ae12ca18): kobject_uevent_env [ 773.448042] kobject: 'rx-6' (00000000ae12ca18): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-6' [ 773.458411] kobject: 'rx-7' (00000000141a3e76): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.467864] kobject: 'rx-7' (00000000141a3e76): kobject_uevent_env [ 773.474222] kobject: 'rx-7' (00000000141a3e76): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-7' [ 773.484630] kobject: 'rx-8' (000000002cece81e): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.494331] kobject: 'rx-8' (000000002cece81e): kobject_uevent_env [ 773.500720] kobject: 'rx-8' (000000002cece81e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-8' [ 773.511133] kobject: 'rx-9' (00000000e46e9414): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.520983] kobject: 'rx-9' (00000000e46e9414): kobject_uevent_env [ 773.527319] kobject: 'rx-9' (00000000e46e9414): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-9' [ 773.537710] kobject: 'rx-10' (0000000075db0b0b): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.547216] kobject: 'rx-10' (0000000075db0b0b): kobject_uevent_env [ 773.553719] kobject: 'rx-10' (0000000075db0b0b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-10' [ 773.564229] kobject: 'rx-11' (0000000055774e7d): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.573860] kobject: 'rx-11' (0000000055774e7d): kobject_uevent_env [ 773.580368] kobject: 'rx-11' (0000000055774e7d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-11' [ 773.590907] kobject: 'rx-12' (000000000ef4c57c): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.600420] kobject: 'rx-12' (000000000ef4c57c): kobject_uevent_env [ 773.606840] kobject: 'rx-12' (000000000ef4c57c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-12' [ 773.617389] kobject: 'rx-13' (00000000341f865b): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.626932] kobject: 'rx-13' (00000000341f865b): kobject_uevent_env [ 773.633507] kobject: 'rx-13' (00000000341f865b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-13' [ 773.644032] kobject: 'rx-14' (00000000335c4366): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.654026] kobject: 'rx-14' (00000000335c4366): kobject_uevent_env [ 773.660514] kobject: 'rx-14' (00000000335c4366): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-14' [ 773.671092] kobject: 'rx-15' (000000001dd9ff18): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.680669] kobject: 'rx-15' (000000001dd9ff18): kobject_uevent_env [ 773.687104] kobject: 'rx-15' (000000001dd9ff18): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-15' [ 773.697686] kobject: 'tx-0' (00000000725a10e6): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.707195] kobject: 'tx-0' (00000000725a10e6): kobject_uevent_env [ 773.713640] kobject: 'tx-0' (00000000725a10e6): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-0' [ 773.723995] kobject: 'tx-1' (00000000f8d0fd1e): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.733589] kobject: 'tx-1' (00000000f8d0fd1e): kobject_uevent_env [ 773.739967] kobject: 'tx-1' (00000000f8d0fd1e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-1' [ 773.750764] kobject: 'tx-2' (0000000099503b4d): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.760372] kobject: 'tx-2' (0000000099503b4d): kobject_uevent_env [ 773.766730] kobject: 'tx-2' (0000000099503b4d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-2' [ 773.777145] kobject: 'tx-3' (000000006f7c774f): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.786991] kobject: 'tx-3' (000000006f7c774f): kobject_uevent_env [ 773.793440] kobject: 'tx-3' (000000006f7c774f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-3' [ 773.803821] kobject: 'tx-4' (0000000088ebcbf6): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.813396] kobject: 'tx-4' (0000000088ebcbf6): kobject_uevent_env [ 773.819776] kobject: 'tx-4' (0000000088ebcbf6): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-4' [ 773.830124] kobject: 'tx-5' (00000000f581b56f): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.839656] kobject: 'tx-5' (00000000f581b56f): kobject_uevent_env [ 773.845990] kobject: 'tx-5' (00000000f581b56f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-5' [ 773.856379] kobject: 'tx-6' (00000000ab080f85): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.865909] kobject: 'tx-6' (00000000ab080f85): kobject_uevent_env [ 773.872304] kobject: 'tx-6' (00000000ab080f85): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-6' [ 773.882635] kobject: 'tx-7' (00000000d1cc1a03): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.892226] kobject: 'tx-7' (00000000d1cc1a03): kobject_uevent_env [ 773.898601] kobject: 'tx-7' (00000000d1cc1a03): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-7' [ 773.909341] kobject: 'tx-8' (000000008626e433): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.918971] kobject: 'tx-8' (000000008626e433): kobject_uevent_env [ 773.925319] kobject: 'tx-8' (000000008626e433): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-8' [ 773.935706] kobject: 'tx-9' (000000008c4e5b46): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.945240] kobject: 'tx-9' (000000008c4e5b46): kobject_uevent_env [ 773.951658] kobject: 'tx-9' (000000008c4e5b46): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-9' [ 773.962033] kobject: 'tx-10' (000000001ed78076): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.971742] kobject: 'tx-10' (000000001ed78076): kobject_uevent_env [ 773.978201] kobject: 'tx-10' (000000001ed78076): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-10' [ 773.988746] kobject: 'tx-11' (000000000f78a12c): kobject_add_internal: parent: 'queues', set: 'queues' [ 773.998334] kobject: 'tx-11' (000000000f78a12c): kobject_uevent_env [ 774.004752] kobject: 'tx-11' (000000000f78a12c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-11' [ 774.015323] kobject: 'tx-12' (000000003e8c094c): kobject_add_internal: parent: 'queues', set: 'queues' [ 774.024951] kobject: 'tx-12' (000000003e8c094c): kobject_uevent_env [ 774.031431] kobject: 'tx-12' (000000003e8c094c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-12' [ 774.042251] kobject: 'tx-13' (0000000066311bfc): kobject_add_internal: parent: 'queues', set: 'queues' [ 774.051977] kobject: 'tx-13' (0000000066311bfc): kobject_uevent_env [ 774.058446] kobject: 'tx-13' (0000000066311bfc): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-13' [ 774.069026] kobject: 'tx-14' (00000000f60ca0d5): kobject_add_internal: parent: 'queues', set: 'queues' [ 774.078626] kobject: 'tx-14' (00000000f60ca0d5): kobject_uevent_env [ 774.085052] kobject: 'tx-14' (00000000f60ca0d5): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-14' [ 774.095610] kobject: 'tx-15' (000000009a9b9e61): kobject_add_internal: parent: 'queues', set: 'queues' [ 774.105228] kobject: 'tx-15' (000000009a9b9e61): kobject_uevent_env [ 774.111753] kobject: 'tx-15' (000000009a9b9e61): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-15' [ 774.123086] device bridge_slave_1 left promiscuous mode [ 774.128977] bridge0: port 2(bridge_slave_1) entered disabled state [ 774.178255] kobject: 'brport' (000000003125bd3c): kobject_uevent_env [ 774.184773] kobject: 'brport' (000000003125bd3c): kobject_uevent_env: filter function caused the event to drop! [ 774.195219] device bridge_slave_0 left promiscuous mode [ 774.200701] bridge0: port 1(bridge_slave_0) entered disabled state [ 774.257670] kobject: 'brport' (000000003125bd3c): kobject_cleanup, parent (null) [ 774.266097] kobject: 'brport' (000000003125bd3c): calling ktype release [ 774.272923] kobject: 'brport': free name [ 774.277704] kobject: 'brport' (00000000381beab5): kobject_uevent_env [ 774.284192] kobject: 'brport' (00000000381beab5): kobject_uevent_env: filter function caused the event to drop! [ 774.294699] kobject: 'brif' (00000000c4eed36e): kobject_cleanup, parent 000000001b2a6974 [ 774.303311] kobject: 'brif' (00000000c4eed36e): auto cleanup kobject_del [ 774.310217] kobject: 'brif' (00000000c4eed36e): calling ktype release [ 774.316853] kobject: (00000000c4eed36e): dynamic_kobj_release [ 774.323164] kobject: 'brif': free name [ 774.337641] kobject: 'brport' (00000000381beab5): kobject_cleanup, parent (null) [ 774.346074] kobject: 'brport' (00000000381beab5): calling ktype release [ 774.352883] kobject: 'brport': free name [ 774.357743] team0 (unregistering): Port device team_slave_1 removed [ 774.364547] kobject: 'rx-0' (000000004bcf0c18): kobject_cleanup, parent 000000009aa388c0 [ 774.372839] kobject: 'rx-0' (000000004bcf0c18): auto cleanup 'remove' event [ 774.380001] kobject: 'rx-0' (000000004bcf0c18): kobject_uevent_env [ 774.386304] kobject: 'rx-0' (000000004bcf0c18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 774.396392] kobject: 'rx-0' (000000004bcf0c18): auto cleanup kobject_del [ 774.403269] kobject: 'rx-0' (000000004bcf0c18): calling ktype release [ 774.409873] kobject: 'rx-0': free name [ 774.413801] kobject: 'tx-0' (000000009428ccd6): kobject_cleanup, parent 000000009aa388c0 [ 774.422056] kobject: 'tx-0' (000000009428ccd6): auto cleanup 'remove' event [ 774.429177] kobject: 'tx-0' (000000009428ccd6): kobject_uevent_env [ 774.435482] kobject: 'tx-0' (000000009428ccd6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 774.445590] kobject: 'tx-0' (000000009428ccd6): auto cleanup kobject_del [ 774.452484] kobject: 'tx-0' (000000009428ccd6): calling ktype release [ 774.459100] kobject: 'tx-0': free name [ 774.463009] kobject: 'queues' (000000009aa388c0): kobject_cleanup, parent (null) [ 774.471484] kobject: 'queues' (000000009aa388c0): calling ktype release [ 774.478286] kobject: 'queues' (000000009aa388c0): kset_release [ 774.484283] kobject: 'queues': free name [ 774.488778] kobject: 'team_slave_1' (00000000a5b4ad32): kobject_uevent_env [ 774.495789] kobject: 'team_slave_1' (00000000a5b4ad32): kobject_uevent_env: uevent_suppress caused the event to drop! [ 774.508823] kobject: 'rx-0' (0000000090c5067d): kobject_cleanup, parent 00000000e871965a [ 774.517068] kobject: 'rx-0' (0000000090c5067d): auto cleanup 'remove' event [ 774.524299] kobject: 'rx-0' (0000000090c5067d): kobject_uevent_env [ 774.530642] kobject: 'rx-0' (0000000090c5067d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 774.541305] kobject: 'rx-0' (0000000090c5067d): auto cleanup kobject_del [ 774.548210] kobject: 'rx-0' (0000000090c5067d): calling ktype release [ 774.554787] kobject: 'rx-0': free name [ 774.558748] kobject: 'tx-0' (00000000e3ea4aa0): kobject_cleanup, parent 00000000e871965a [ 774.566991] kobject: 'tx-0' (00000000e3ea4aa0): auto cleanup 'remove' event [ 774.574138] kobject: 'tx-0' (00000000e3ea4aa0): kobject_uevent_env [ 774.580512] kobject: 'tx-0' (00000000e3ea4aa0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 774.591023] kobject: 'tx-0' (00000000e3ea4aa0): auto cleanup kobject_del [ 774.597981] kobject: 'tx-0' (00000000e3ea4aa0): calling ktype release [ 774.604558] kobject: 'tx-0': free name [ 774.608522] kobject: 'queues' (00000000e871965a): kobject_cleanup, parent (null) [ 774.616929] kobject: 'queues' (00000000e871965a): calling ktype release [ 774.623731] kobject: 'queues' (00000000e871965a): kset_release [ 774.629734] kobject: 'queues': free name [ 774.634034] kobject: 'veth1_to_team' (00000000880213e1): kobject_uevent_env [ 774.641202] kobject: 'veth1_to_team' (00000000880213e1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 774.653052] team0 (unregistering): Port device team_slave_0 removed [ 774.659958] kobject: 'rx-0' (0000000014757ad1): kobject_cleanup, parent 00000000076ccad5 [ 774.668234] kobject: 'rx-0' (0000000014757ad1): auto cleanup 'remove' event [ 774.675332] kobject: 'rx-0' (0000000014757ad1): kobject_uevent_env [ 774.681672] kobject: 'rx-0' (0000000014757ad1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 774.691744] kobject: 'rx-0' (0000000014757ad1): auto cleanup kobject_del [ 774.698640] kobject: 'rx-0' (0000000014757ad1): calling ktype release [ 774.705215] kobject: 'rx-0': free name