1b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:26 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:38:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519", 0x87}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:26 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:38:26 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x0, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:26 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000002c0)={0x0, 0x1f, 0x8}) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519", 0x87}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:26 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:38:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519", 0x87}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:26 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:38:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588baa9dcdd3a0a", 0x9e}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:26 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x0, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:26 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:38:26 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000002c0)={0x0, 0x1f, 0x8}) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b751962", 0x88}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @rand_addr, 0x0, 0x0, 'rr\x00'}, 0x2c) 15:38:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:27 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x0, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b751962", 0x88}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:27 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000002c0)={0x0, 0x1f, 0x8}) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [0x29c, 0x58, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff87, 0x0, 0x0, 0x0, [0x14, 0x0, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3201]}}}}}}}}, 0x0) 15:38:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b751962", 0x88}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:27 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x0, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9df", 0x93}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9df", 0x93}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:27 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x0, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9df", 0x93}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:28 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000002c0)={0x0, 0x1f, 0x8}) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:28 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x0, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588ba", 0x99}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:28 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000002c0)={0x0, 0x1f, 0x8}) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb2", 0x94}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb2", 0x94}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:28 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x0, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb2", 0x94}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:28 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000002c0)={0x0, 0x1f, 0x8}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, 0xffffffffffffffff, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:29 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff935", 0x97}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:29 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x0, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:29 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000002c0)={0x0, 0x1f, 0x8}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, 0xffffffffffffffff, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff935", 0x97}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff935", 0x97}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x102800) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xf) dup3(0xffffffffffffffff, r0, 0x0) 15:38:29 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000002c0)={0x0, 0x1f, 0x8}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, 0xffffffffffffffff, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:29 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x0, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:30 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff935", 0x97}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x102800) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xf) dup3(0xffffffffffffffff, r0, 0x0) 15:38:30 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:30 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x0, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff935", 0x97}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x102800) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xf) dup3(0xffffffffffffffff, r0, 0x0) 15:38:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:30 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x0, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff935", 0x97}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:31 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:31 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x4}], 0x1, 0x0) 15:38:31 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x0, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x4}], 0x1, 0x0) 15:38:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:31 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x4}], 0x1, 0x0) 15:38:31 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x0, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:32 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {0x0}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:32 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x1) fcntl$setstatus(r0, 0x4, 0x102800) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xf) dup3(r0, 0xffffffffffffffff, 0x0) 15:38:32 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:32 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x0, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {0x0}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:32 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x1) fcntl$setstatus(r0, 0x4, 0x102800) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xf) dup3(r0, 0xffffffffffffffff, 0x0) 15:38:32 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(0xffffffffffffffff, r0, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:32 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x1) fcntl$setstatus(r0, 0x4, 0x102800) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xf) dup3(r0, 0xffffffffffffffff, 0x0) 15:38:32 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0x0, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:32 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {0x0}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:32 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(0xffffffffffffffff, r0, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:32 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0x0, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:33 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(0xffffffffffffffff, r0, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:33 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0x0, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:33 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:33 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x0, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc", 0x3}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:34 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:34 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x0, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc", 0x3}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:34 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:34 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x0, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:34 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc", 0x3}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:34 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:34 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:34 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:35 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc52", 0x4}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:35 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:35 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:35 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc52", 0x4}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e5799", 0xa3}, {&(0x7f0000000100)="1d71fc52", 0x4}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:35 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:36 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x4}], 0x1, 0x0) 15:38:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:36 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x4}], 0x1, 0x0) 15:38:36 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x4}], 0x1, 0x0) 15:38:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:36 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:37 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:37 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:37 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r5 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r5) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r4, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r3, 0x0, 0x7, 0x2) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:38 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:38 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r5 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r5) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r4, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r3, 0x0, 0x7, 0x2) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:38 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6e", 0x52}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:38 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r5 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r5) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r4, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r3, 0x0, 0x7, 0x2) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6e", 0x52}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6e", 0x52}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:39 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:39 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(0x0, 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221e", 0x7b}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221e", 0x7b}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:39 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221e", 0x7b}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:39 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(0x0, 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f899", 0x8f}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:39 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:39 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(0x0, 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f899", 0x8f}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f899", 0x8f}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:40 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f", 0x99}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:40 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:40 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f", 0x99}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:40 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f", 0x99}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e", 0x9e}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:41 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:41 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e", 0x9e}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e", 0x9e}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:41 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:41 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e", 0xa1}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:41 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e", 0xa1}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:41 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:41 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e", 0xa1}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x0, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e57", 0xa2}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:42 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:42 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x0, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e57", 0xa2}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:42 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:42 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000580)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="2f012f180396de15dba1b39274b4161b8e40a0a337683090e05a4a288d9751d563a3c8767e603f72642daf561e5201e7b0247076527762d015dfd70cde08f7c5314fc9e25df9542b65302c7848b027b41e6eb1545e5e4c17a712234bb0aae712be58b3675a9b3cf4c15b828c1d5e4236bf71a4868a3186ca49221ef4e4a40587f483a0cb7fdd086788bc1e0410f8993c9c376321547a356c7f7fdc12147e82208e57", 0xa2}, {&(0x7f0000000100)="1d71fc5209", 0x5}, {&(0x7f0000000280)="2eae38d83068bef987f9ae547225811357c67c03c4dc5e251a320b069c7c46b24813dc16d565fcd8779f84fb287c9f49df396e1f0a2b968abfebd120fa20a552376fd0d88d3cc2cd1946dd49df735fda4f73cecc5e8f2a5cf67b6b1babcbb7c36548ccde9e434adb0642e31bc2b46021927c99d47c276cb631956d1c91ceabe5b06db8c81b7519627f20ea680685b5992cf9dfb29ff93588", 0x98}, {&(0x7f0000000400)="1f0ae95582d1e11e1da1034ea46556477e25de623daff9607458", 0x1a}, {&(0x7f0000000440)="99c49d36d9bb9e5e98", 0x9}], 0x5}], 0x1, 0x0) 15:38:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x0, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:42 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r2) 15:38:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:43 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:43 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:43 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:38:43 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:43 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:43 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:43 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x5) 15:38:43 executing program 4: clock_gettime(0x0, &(0x7f0000000240)) semtimedop(0x0, &(0x7f0000000100)=[{}, {}], 0x2, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, 0x0) 15:38:44 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:44 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, 0x0) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:44 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0xd, 0x1, 0x0, "8dfb7b5b4f6f13ef92c8055020000000000000b5b3a6ec9052f77300"}) 15:38:44 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:44 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000008340)='/dev/autofs\x00', 0x0, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) 15:38:44 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, 0x0) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:44 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:44 executing program 4: mlock(&(0x7f0000fec000/0x13000)=nil, 0x13000) 15:38:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) [ 315.586985] protocol 88fb is buggy, dev hsr_slave_0 15:38:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:45 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:45 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, 0x0) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:45 executing program 4: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) 15:38:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$P9_RSTATu(r0, 0x0, 0x0) 15:38:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:45 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:45 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x0, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:45 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000700)='/dev/input/event#\x00', 0x7fff, 0x0) preadv(r0, 0x0, 0x0, 0x0) 15:38:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:45 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:45 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x0, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x100) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r2 = dup2(r0, r1) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, 0x0) 15:38:46 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:46 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x0, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:46 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:46 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, r0, 0x0) 15:38:46 executing program 4: 15:38:46 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:47 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:47 executing program 4: 15:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, 0x0) dup3(r1, r0, 0x0) 15:38:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:47 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:47 executing program 4: 15:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, 0x0) dup3(r1, r0, 0x0) 15:38:47 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:47 executing program 4: 15:38:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, 0x0) dup3(r1, r0, 0x0) 15:38:47 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(0x0, &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:47 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:47 executing program 4: 15:38:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) dup3(r1, r0, 0x0) 15:38:48 executing program 4: 15:38:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:48 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:48 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(0x0, &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:48 executing program 4: 15:38:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) dup3(r1, r0, 0x0) 15:38:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:48 executing program 4: 15:38:48 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, 0x0, 0x0, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:48 executing program 4: 15:38:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:49 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(0x0, &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) dup3(r1, r0, 0x0) 15:38:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:49 executing program 4: 15:38:49 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, 0x0, 0x0, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:49 executing program 4: 15:38:49 executing program 4: 15:38:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(0xffffffffffffffff, r0, 0x0) 15:38:49 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, 0x0, 0x0, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:49 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', 0x0, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:50 executing program 4: 15:38:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(0xffffffffffffffff, r0, 0x0) 15:38:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:50 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90), 0x0, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:50 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', 0x0, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:50 executing program 4: 15:38:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(0xffffffffffffffff, r0, 0x0) 15:38:50 executing program 4: 15:38:50 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90), 0x0, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:50 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', 0x0, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, 0xffffffffffffffff, 0x0) 15:38:51 executing program 4: 15:38:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:51 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90), 0x0, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:51 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:51 executing program 4: 15:38:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, 0xffffffffffffffff, 0x0) 15:38:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:51 executing program 4: 15:38:51 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:51 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) dup3(r1, 0xffffffffffffffff, 0x0) 15:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e0000001d008183ad5de087185082cf0124b0eba0070060002339a00576f9835b3f00009148700000f85ac47c45", 0x2e}], 0x2c2}, 0x0) 15:38:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:52 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:52 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 323.209988] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 15:38:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e0000001d008183ad5de087185082cf0124b0eba0070060002339a00576f9835b3f00009148700000f85ac47c45", 0x2e}], 0x2c2}, 0x0) 15:38:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:38:52 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:52 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740), 0x0, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 323.422970] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 15:38:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) [ 323.599717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.606560] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.626181] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.648765] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.663238] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.671061] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.682185] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.690173] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.697142] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.703926] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.710763] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 323.722482] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:53 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x20406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xed21) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2000400) sync_file_range(r0, 0x100, 0x9, 0x3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) getpeername(r1, &(0x7f0000000100)=@nl=@unspec, &(0x7f0000000000)=0x80) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) accept(r2, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000016) sendto$inet6(r2, 0x0, 0x184, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) 15:38:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0x400000000000328, 0x0) 15:38:53 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:53 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740), 0x0, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) [ 324.087633] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.094375] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.135061] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.160815] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.168309] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:38:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0x400000000000328, 0x0) [ 324.182229] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.191455] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.200124] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.217238] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.225084] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.233917] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.243638] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 324.254872] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:38:53 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740), 0x0, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:53 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 324.392575] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.406464] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.424598] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 15:38:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, 0x0, 0x0, 0x0) 15:38:53 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0xa, &(0x7f0000000040), 0x4) [ 324.464529] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.491098] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.514227] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.543943] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.581527] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.601765] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.608920] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.627206] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 324.656649] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:53 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$MAP_DELETE_ELEM(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) 15:38:53 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3", 0x3f, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:53 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:38:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, 0x0, 0x0, 0x0) 15:38:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009e80)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, 0x0, 0x0, 0x0) 15:38:54 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') recvmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, r1, 0xa01}, 0x14}}, 0x0) 15:38:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:38:54 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:38:54 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3", 0x3f, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:54 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:38:54 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 15:38:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0xacb5) 15:38:54 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:54 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3", 0x3f, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:54 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:38:54 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:38:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0xacb5) 15:38:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0xacb5) 15:38:55 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:55 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:38:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:55 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d6", 0x5f, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xacb5) 15:38:55 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:38:55 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:38:55 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 326.759020] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 326.770038] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 326.776761] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 15:38:55 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) [ 326.820100] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 326.833257] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 326.844029] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 326.852158] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 15:38:55 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 326.886523] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 326.899032] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 326.909746] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 326.916518] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 326.924811] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xacb5) 15:38:56 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d6", 0x5f, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:56 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 327.061326] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.082871] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.112841] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.132299] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.166112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.192200] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.203301] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.234782] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.246082] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 15:38:56 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 327.279573] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.286296] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 327.332664] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:56 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:56 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d6", 0x5f, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xacb5) 15:38:56 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 327.606645] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 327.625924] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 15:38:56 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 327.652120] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 327.665039] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 327.674289] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 15:38:56 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) [ 327.708922] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 327.730325] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 327.744742] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 327.752373] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 327.759769] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 327.766658] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 15:38:56 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xacb5) [ 327.806064] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:56 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x0, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:56 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f", 0x6f, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 327.888316] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 327.895050] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 327.907480] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 15:38:56 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 327.948243] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 327.976988] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 327.998155] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 328.019403] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 328.038933] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 15:38:57 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x0, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 328.060612] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 328.074662] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 328.084650] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 328.097555] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x2a7, 0x0, 0x0) 15:38:57 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xacb5) 15:38:57 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f", 0x6f, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:57 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:38:57 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x0, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 328.531078] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.550637] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.580519] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.613844] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 15:38:57 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:38:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x2a7, 0x0, 0x0) [ 328.634534] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.644481] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.652685] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.659974] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.659995] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.660014] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.660033] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 328.698298] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:57 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xacb5) 15:38:57 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:38:57 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f", 0x6f, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 328.857938] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 328.864680] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 328.864699] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 328.885944] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 15:38:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x2a7, 0x0, 0x0) [ 328.920739] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 328.959691] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 15:38:57 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 328.992390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 329.012194] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 15:38:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 329.041558] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 329.052165] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 329.062328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 329.084782] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:58 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:38:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xacb5) 15:38:58 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e4412", 0x77, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 329.325995] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.358636] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.392079] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.410284] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.423036] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.435880] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.443645] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.450630] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.457633] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.464322] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.471323] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 329.479045] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:58 executing program 2: syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:38:58 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:58 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:38:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x3f) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x477) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 15:38:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xacb5) 15:38:58 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e4412", 0x77, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 329.628992] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 329.635748] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 329.635770] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 329.635790] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 329.635809] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 329.635831] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 15:38:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='uid_map\x00') preadv(r1, &(0x7f00000017c0), 0x333, 0x0) 15:38:58 executing program 2: syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) [ 329.635848] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 329.635863] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 329.635878] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 329.635894] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 329.635910] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 15:38:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4) 15:38:58 executing program 2: syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) [ 329.807253] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xacb5) 15:38:58 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:58 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:38:59 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e4412", 0x77, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 330.045666] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 330.059918] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 330.081513] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 15:38:59 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:38:59 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 330.113011] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 330.145684] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 330.182818] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 330.217171] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 330.258660] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 15:38:59 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779", 0x7b, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000240)="3718bd6642fea3ca05a015553c0e6d2667536ee86e21d4e52860b3482c47bcae60ea5a35c31f1dde2fa71c2c7b4bbeb0e3651ca82eb7ceba7da431f98aa012846a0020644a62d15131df454f321fec7802b4d4995a995676ce153b1741cfe2f8c7572c50f76a259707", 0x69}], 0x1, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYBLOB="1f000000000000000a000000050000a90000e7fc4b83bbb6a23b4b6942b7871001"]) 15:38:59 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) [ 330.299418] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 330.354166] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 330.387910] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 15:38:59 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 330.409467] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz1] on syz1 15:38:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:38:59 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:38:59 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:38:59 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:38:59 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779", 0x7b, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 330.648669] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 15:38:59 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(0x0, 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) [ 330.700826] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 330.723572] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 330.740085] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 15:38:59 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 330.773136] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 330.795507] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 15:38:59 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 330.831914] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 330.846142] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 15:38:59 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 330.882855] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 330.904293] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 330.930651] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 15:38:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/138, 0x8a}, {&(0x7f0000000300)=""/162, 0xa2}, {&(0x7f0000001600)=""/4096, 0x2100}, {&(0x7f00000027c0)=""/129, 0x81}], 0x4}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xffffff9a, &(0x7f0000000000)={&(0x7f0000000540)={0x14, 0x42, 0x105}, 0x14}}, 0x0) 15:38:59 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779", 0x7b, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 330.980821] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:00 executing program 3: modify_ldt$write2(0x11, &(0x7f0000000000)={0xf7f}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000040), 0x10) 15:39:00 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:39:00 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 331.126960] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.133701] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.203744] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.220154] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.260857] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.280834] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.297295] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 15:39:00 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7065726d6861742030783030303030303030303073656c6600656d302a7070703000a900737461636b202c0026262f2f656d30706b703176626f786e6574004dbd7bcd73c45b28708e302d00737461636b2000000000007993ab57437a3223842716a84a11a2f15bf1beed4cf3c1977818f7467bad5c040d69972b17c7d7bb34557e6531633c12934bd982c8f6022e72c45998bacc26cc99de8602ee0eac0cdb5b436cefff39468d011322ac1d35682374ac2cdcb26663abd43bc6a15514ef21b70e6f8d957df72bae7d84c90b99871afedb424fd01514a8ea7b44996f72ac413d508a7d"], 0xfffffea4) 15:39:00 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f7", 0x7d, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 331.309847] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.325628] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.354657] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.385006] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 331.401683] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:00 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(0x0, 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:39:00 executing program 3: socketpair$unix(0x1, 0x8000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000100000011, 0x802, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'veth0_to_bond\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) io_setup(0x6, &(0x7f0000000280)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0}]) 15:39:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:00 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:00 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, 0xffffffffffffffff, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:39:00 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f7", 0x7d, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 331.704601] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.734496] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.754404] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.776215] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.785917] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.795136] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.806700] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.817071] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.823831] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.838500] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.845226] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 331.853521] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:00 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:00 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f7", 0x7d, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:00 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, 0xffffffffffffffff, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:39:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) [ 332.008303] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.045240] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.070271] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.112665] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.134229] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.150671] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 15:39:01 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 332.160397] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.172591] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.185468] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.192846] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.200438] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 332.222218] hid-generic 0000:0000:0000.0010: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:01 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(0x0, 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:39:01 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:01 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, 0xffffffffffffffff, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:39:01 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 332.600949] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.617340] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.636954] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.643689] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.692614] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.721111] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.728168] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.740375] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.747287] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.755257] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.762266] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 332.772135] hid-generic 0000:0000:0000.0011: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:01 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:01 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:01 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, 0x0, 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 332.956018] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 332.966492] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 332.990346] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 333.024133] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 333.053164] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 15:39:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) [ 333.071064] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 333.084209] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 333.105924] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 333.123187] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 333.140505] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 333.154173] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 333.171921] hid-generic 0000:0000:0000.0012: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:02 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:02 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:02 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:39:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:02 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, 0x0, 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:39:02 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:02 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 333.593592] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 333.622776] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 333.672611] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 333.702792] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 15:39:02 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 333.718440] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 333.735237] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 333.742500] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 333.761726] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 333.770210] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 333.782931] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 333.793998] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 15:39:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) [ 333.825801] hid-generic 0000:0000:0000.0013: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:02 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:02 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, 0x0, 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 334.003062] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.024360] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.058371] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.095942] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.145389] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.173833] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.193128] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.204939] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.212624] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.219948] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 334.228545] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 15:39:03 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x1d, &(0x7f0000000040), 0x4) 15:39:03 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) [ 334.242358] hid-generic 0000:0000:0000.0014: hidraw0: HID v0.00 Device [syz1] on syz1 [ 334.373420] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 334.393365] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 334.406721] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 15:39:03 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:39:03 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:39:03 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:03 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x1d, &(0x7f0000000040), 0x4) [ 334.460300] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 334.469011] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 334.492625] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 15:39:03 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 334.515031] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 334.535419] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 334.542939] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 15:39:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc0dc1bbb6a23b4b6942d1871001000000000000022560b700ff0b784d9b"]) [ 334.581717] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 334.594577] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 334.614548] hid-generic 0000:0000:0000.0015: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:03 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:03 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) 15:39:03 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 334.746249] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 334.768158] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 334.821791] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 334.854344] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 334.876344] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 334.900229] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 334.913729] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 15:39:03 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 334.939725] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 334.952164] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 334.965670] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 15:39:03 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x8}, 0xc) [ 334.990547] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 335.022620] hid-generic 0000:0000:0000.0016: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:04 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:39:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="e8"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 15:39:04 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:04 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:04 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 15:39:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:04 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:04 executing program 3: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x6}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) [ 335.492096] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 335.525953] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 15:39:04 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x0, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 335.568045] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 335.612084] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 335.635547] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 335.645216] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 15:39:04 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 335.714053] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 335.748392] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 335.761027] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 15:39:04 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 335.805861] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 335.833332] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 335.851247] hid-generic 0000:0000:0000.0017: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:05 executing program 2: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:39:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:05 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x0, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:05 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 15:39:05 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:05 executing program 2: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 15:39:05 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) [ 336.353349] audit: type=1800 audit(1564414745.343:113): pid=16508 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16801 res=0 15:39:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae6badf3ab85f04000000d2eb", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001980)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000380)="1c458780f391bf93f0248dbb5dc1566ee7", 0x11}], 0x1}], 0x1, 0x0) 15:39:05 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x0, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:05 executing program 2: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) [ 336.489045] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.495790] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.541892] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.559908] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.585123] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.609648] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.623129] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 15:39:05 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, 0x0, 0x0, 0x0) [ 336.631609] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.642011] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.648927] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.648948] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 336.672998] hid-generic 0000:0000:0000.0018: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:05 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:05 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0xc) 15:39:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:05 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x8, 0x1, 0x0, "8dfb7b5b4f6f13ef92c8055020000000000000b5b3a6ec9052f77300"}) 15:39:05 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:05 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, 0x0, 0x0, 0x0) 15:39:05 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:06 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00006a6000/0x1000)=nil, 0x1000, 0x0, 0xfffffffffffffffd, 0x0) [ 336.974698] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 336.994884] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 337.043708] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 337.072610] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 15:39:06 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, 0x0, 0x0, 0x0) 15:39:06 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0xc) 15:39:06 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 337.094184] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 337.114721] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 337.130830] mmap: syz-executor.3 (16599) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 337.141455] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 337.193085] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 337.215473] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 337.224172] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 337.236723] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 15:39:06 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400), 0x0, 0x0) 15:39:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 337.254833] hid-generic 0000:0000:0000.0019: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:06 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:06 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:06 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400), 0x0, 0x0) 15:39:06 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0xc) 15:39:06 executing program 3: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000480)={0x0, {{0xa, 0x4e22, 0x8001, @empty}}, {{0xa, 0x0, 0xfffffffffffffffd, @mcast2}}}, 0x108) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 337.477891] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 337.488374] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 337.495112] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 337.545899] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 337.555208] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 337.576416] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 15:39:06 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:06 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400), 0x0, 0x0) [ 337.591821] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 337.605748] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 337.653776] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 337.681875] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 15:39:06 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{0x0}], 0x1, 0x0) [ 337.702250] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 337.715098] hid-generic 0000:0000:0000.001A: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:06 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7}, 0xc) 15:39:06 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:06 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:06 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{0x0}], 0x1, 0x0) 15:39:06 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:07 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f0000001400)=[{0x0}], 0x1, 0x0) [ 338.094689] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.135125] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.165824] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.196506] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.206969] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.220197] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.240643] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.254933] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.262792] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.277419] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.284913] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 338.303274] hid-generic 0000:0000:0000.001B: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x4a4}], 0x133, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='loginuid\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 15:39:07 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7}, 0xc) 15:39:07 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:07 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, 0x0, 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:07 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, 0x0, 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x20, 0x11, 0xa29, 0x0, 0x0, {0x17, 0x0, 0x0, r1}}, 0x20}}, 0x0) 15:39:07 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:07 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, 0x0, 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) [ 339.190239] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.399604] device bridge_slave_0 left promiscuous mode [ 339.405229] bridge0: port 1(bridge_slave_0) entered disabled state 15:39:08 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = memfd_create(&(0x7f0000000380)='^\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x0, {0x80, 0x1}}, 0x14) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7}, 0xc) 15:39:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:08 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:08 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x20, 0x11, 0xa29, 0x0, 0x0, {0x17, 0x0, 0x0, r1}}, 0x20}}, 0x0) 15:39:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:08 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:08 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:08 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x505ac0}], 0x1}, 0x3f00) 15:39:09 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000100)=""/22) 15:39:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:09 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x80000000, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 15:39:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:09 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:09 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ppoll(&(0x7f00000000c0)=[{r1}], 0x1, &(0x7f0000000100), 0x0, 0x0) 15:39:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454cf2deda40729b25fb0000000000004000588171001000720155c4af96311d39962100001600380001000900ff030100029ebd6ce1afd40e4ec61030cf4b0794000000094baa1014256024989fb0daa1e1dc3a7d03463851928c68c9ffe59594233c796be7a99e4c75ecb2d3b988779663c376cc5b11e0400ed69a0d0c8a195b53a10000008164d810e7d64ea463c66f2160aa2f34"], 0x97) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/56) ioprio_get$uid(0x3, 0x0) 15:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:09 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:09 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 15:39:09 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:09 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) [ 340.879327] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:39:10 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:10 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 15:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454cf2deda40729b25fb0000000000004000588171001000720155c4af96311d39962100001600380001000900ff030100029ebd6ce1afd40e4ec61030cf4b0794000000094baa1014256024989fb0daa1e1dc3a7d03463851928c68c9ffe59594233c796be7a99e4c75ecb2d3b988779663c376cc5b11e0400ed69a0d0c8a195b53a10000008164d810e7d64ea463c66f2160aa2f34"], 0x97) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/56) ioprio_get$uid(0x3, 0x0) 15:39:10 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:10 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:10 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 15:39:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:10 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:10 executing program 0: setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 15:39:10 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454cf2deda40729b25fb0000000000004000588171001000720155c4af96311d39962100001600380001000900ff030100029ebd6ce1afd40e4ec61030cf4b0794000000094baa1014256024989fb0daa1e1dc3a7d03463851928c68c9ffe59594233c796be7a99e4c75ecb2d3b988779663c376cc5b11e0400ed69a0d0c8a195b53a10000008164d810e7d64ea463c66f2160aa2f34"], 0x97) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/56) ioprio_get$uid(0x3, 0x0) 15:39:10 executing program 0: setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 15:39:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:10 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:10 executing program 0: setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 15:39:10 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000280), 0xacb5) 15:39:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454cf2deda40729b25fb0000000000004000588171001000720155c4af96311d39962100001600380001000900ff030100029ebd6ce1afd40e4ec61030cf4b0794000000094baa1014256024989fb0daa1e1dc3a7d03463851928c68c9ffe59594233c796be7a99e4c75ecb2d3b988779663c376cc5b11e0400ed69a0d0c8a195b53a10000008164d810e7d64ea463c66f2160aa2f34"], 0x97) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/56) ioprio_get$uid(0x3, 0x0) 15:39:10 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 15:39:10 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 15:39:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0xacb5) 15:39:11 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:11 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 342.153433] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 342.179555] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 15:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) [ 342.227835] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 342.264376] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 342.294488] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 342.302747] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 15:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:11 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x203}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 15:39:11 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 342.377310] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 342.384059] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 15:39:11 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) [ 342.454436] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 342.491960] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 15:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) [ 342.515108] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 342.539112] hid-generic 0000:0000:0000.001C: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:11 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 15:39:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0xacb5) 15:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:39:11 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:11 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:11 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 15:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0xacb5) 15:39:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:39:12 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 342.988425] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 342.995159] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 15:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) [ 343.039011] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 343.064976] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 343.092176] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 343.118272] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 15:39:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) 15:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r0, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) [ 343.145294] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 343.168326] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 343.181424] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 15:39:12 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:12 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 343.201451] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 15:39:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22, 0x0, @empty}, 0x1c) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) readv(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) shutdown(0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) 15:39:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, 0x0, 0x0) [ 343.242698] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 343.273421] hid-generic 0000:0000:0000.001D: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r0, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x0, 0x60000000}) [ 343.397576] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 343.418849] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 343.428920] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:39:12 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r0, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) [ 343.463720] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 343.471829] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 343.493969] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 15:39:12 executing program 0: clone(0x2102001fdd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) r2 = dup(r1) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7fffffd}) tkill(r0, 0x18) ptrace$peekuser(0x3, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) write$P9_RRENAME(r2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f0000000100)) [ 343.520494] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 343.537484] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 343.549954] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 343.561304] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 15:39:12 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 343.575404] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 343.603049] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 15:39:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000001a40)="3ef69108a165", 0xfffffffffffffeda, 0x0, 0x0, 0x0) dup2(r1, r2) [ 343.635410] hid-generic 0000:0000:0000.001E: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, 0x0, 0x0) 15:39:12 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 343.700883] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 343.755064] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 343.821008] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 343.839398] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 343.847617] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 343.861719] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 15:39:12 executing program 3: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="2cc10f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340)}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x136, 0x0, 0x1}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) [ 343.878187] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 343.886382] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 343.895045] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 15:39:12 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:12 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000001a40)="3ef69108a165", 0xfffffffffffffeda, 0x0, 0x0, 0x0) dup2(r1, r2) [ 343.920355] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 343.940399] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 15:39:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) [ 343.999651] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 344.024252] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 344.025299] ptrace attach of "/root/syz-executor.3"[17107] was attempted by "/root/syz-executor.3"[17111] 15:39:13 executing program 3: mkdir(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x128) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$TIOCCONS(r0, 0x541d) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) [ 344.046762] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 344.059070] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:39:13 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, 0x0, 0x0) 15:39:13 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) [ 344.092987] hid-generic 0000:0000:0000.001F: hidraw0: HID v0.00 Device [syz1] on syz1 15:39:13 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:39:13 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x40c2, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=.']) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 15:39:13 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:13 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:13 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) [ 344.467924] overlayfs: workdir and upperdir must be separate subtrees 15:39:13 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e8904655361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffe4532a434e624ac93616105829576904e70bfeb59800f97c97644ab8a7"}) 15:39:13 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 344.545884] overlayfs: filesystem on './file0' not supported 15:39:13 executing program 3: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x0) 15:39:13 executing program 1: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 15:39:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:13 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@generic={0x0, "c34acff049637a64431e09080cf2690827b36b18d957e2a476533827725ce7223f3ea7fc0ba8d69c83a7fc4fe572936d653805dea95129294ce36444551def08acfcb328470a92da519609ae301aa3655e9d3e11b1fbf6c616fe4cac3c98e4674992e02a2f619858e5c568af4175811f9ed5b773184f0f7711282a48ce5c"}, 0xa, &(0x7f0000000300), 0x28d, &(0x7f0000000600)}}], 0x2, 0x0) 15:39:13 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) 15:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:14 executing program 3: socketpair$unix(0x1, 0x2000000000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c00000000000000000000000200090008000000e500000000000000030006000000000002000000e0000001000000000000000002000100000000000046000200000000030005000000000002000000e00000010000000000000000"], 0x60}}, 0x0) 15:39:14 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:14 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, 0x0, &(0x7f0000000180)) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:14 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:14 executing program 1: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 15:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:14 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, 0x0, &(0x7f0000000180)) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:14 executing program 3: 15:39:14 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:14 executing program 0: 15:39:14 executing program 3: 15:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:14 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, 0x0, &(0x7f0000000180)) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:14 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:14 executing program 1: 15:39:15 executing program 3: 15:39:15 executing program 1: 15:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:15 executing program 0: 15:39:15 executing program 3: 15:39:15 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:15 executing program 1: 15:39:15 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, 0x0) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:15 executing program 0: 15:39:15 executing program 3: 15:39:15 executing program 1: 15:39:15 executing program 3: 15:39:15 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:15 executing program 1: 15:39:15 executing program 0: 15:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:15 executing program 0: 15:39:15 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, 0x0) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:15 executing program 1: 15:39:15 executing program 3: 15:39:15 executing program 0: 15:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:15 executing program 3: 15:39:15 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:15 executing program 1: 15:39:15 executing program 0: 15:39:15 executing program 3: 15:39:15 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, 0x0) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:15 executing program 1: 15:39:16 executing program 0: 15:39:16 executing program 3: 15:39:16 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) 15:39:16 executing program 1: 15:39:16 executing program 0: 15:39:16 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r5 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r5) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r4, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(0xffffffffffffffff, 0x0, 0x7, 0x2) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:16 executing program 3: 15:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:16 executing program 0: 15:39:16 executing program 1: 15:39:16 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, 0x0, 0x0, 0x0) 15:39:16 executing program 3: 15:39:16 executing program 0: 15:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:16 executing program 3: 15:39:16 executing program 3: 15:39:16 executing program 1: 15:39:16 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r5 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r5) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r4, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(0xffffffffffffffff, 0x0, 0x7, 0x2) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:16 executing program 0: 15:39:16 executing program 3: 15:39:16 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, 0x0, 0x0, 0x0) 15:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:16 executing program 1: 15:39:16 executing program 0: 15:39:16 executing program 3: 15:39:16 executing program 1: 15:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:16 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x3e7, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 15:39:16 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, 0x0, 0x0, 0x0) 15:39:16 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r5 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r5) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r4, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(0xffffffffffffffff, 0x0, 0x7, 0x2) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:16 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:16 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x11, @rand_addr, 0x0, 0x0, 'fo\x00'}, {@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x44) 15:39:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@fat=@showexec='showexec'}]}) 15:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:17 executing program 4: socketpair$unix(0x1, 0x80000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)="24000000680007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 15:39:17 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x4000030000000304, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\xecJ\x00\x965\x00'}) 15:39:17 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x0, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 348.212223] FAT-fs (loop1): bogus number of reserved sectors [ 348.271793] selinux_nlmsg_perm: 5 callbacks suppressed [ 348.271809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=104 sclass=netlink_route_socket pig=17421 comm=syz-executor.4 [ 348.277353] FAT-fs (loop1): Can't find a valid FAT filesystem 15:39:17 executing program 4: write$selinux_create(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000700)=ANY=[@ANYBLOB="010003000180c200000f495567160a017172d90f6b119a0d13b5b7e2d10180c20000"]) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00\x00\x00\x00_\xa4\x00\x00\x01', {0x2, 0x0, @remote}}) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040001}, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) unlink(&(0x7f0000000640)='./file0\x00') pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000440)="4940df1aa5186e5234a247445158441da7941bb4e4bf7b3b3b2fd71e8770593887133001a952fafe31d7bfdaa792fdbb3e7e3ef55549f6de2c6cc12d80", 0x3d, 0x200080d1, &(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="6f000000750200640000009e2d66eb794775b65d25e15be8c4f6"], 0x1a) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) io_setup(0xc0c8, &(0x7f0000000040)) fallocate(r2, 0x20, 0x0, 0x8000) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0x7, 0x0, 0x7fffffff, 0xff, 0x9}) 15:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:17 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 15:39:17 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 348.421720] FAT-fs (loop1): bogus number of reserved sectors [ 348.447844] FAT-fs (loop1): Can't find a valid FAT filesystem 15:39:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = dup3(r0, r1, 0x0) bind$packet(r3, 0x0, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, 0x0, 0x0) fchmod(r0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) 15:39:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:17 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x0, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 15:39:17 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = dup3(r0, r1, 0x0) bind$packet(r3, 0x0, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, 0x0, 0x0) fchmod(r0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) 15:39:17 executing program 4: write$selinux_create(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000700)=ANY=[@ANYBLOB="010003000180c200000f495567160a017172d90f6b119a0d13b5b7e2d10180c20000"]) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00\x00\x00\x00_\xa4\x00\x00\x01', {0x2, 0x0, @remote}}) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040001}, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) unlink(&(0x7f0000000640)='./file0\x00') pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000440)="4940df1aa5186e5234a247445158441da7941bb4e4bf7b3b3b2fd71e8770593887133001a952fafe31d7bfdaa792fdbb3e7e3ef55549f6de2c6cc12d80", 0x3d, 0x200080d1, &(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="6f000000750200640000009e2d66eb794775b65d25e15be8c4f6"], 0x1a) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) io_setup(0xc0c8, &(0x7f0000000040)) fallocate(r2, 0x20, 0x0, 0x8000) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0x7, 0x0, 0x7fffffff, 0xff, 0x9}) 15:39:17 executing program 0: write$selinux_create(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000700)=ANY=[@ANYBLOB="010003000180c200000f495567160a017172d90f6b119a0d13b5b7e2d10180c20000"]) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00\x00\x00\x00_\xa4\x00\x00\x01', {0x2, 0x0, @remote}}) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040001}, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) unlink(&(0x7f0000000640)='./file0\x00') pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000440)="4940df1aa5186e5234a247445158441da7941bb4e4bf7b3b3b2fd71e8770593887133001a952fafe31d7bfdaa792fdbb3e7e3ef55549f6de2c6cc12d80", 0x3d, 0x200080d1, &(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="6f000000750200640000009e2d66eb794775b65d25e15be8c4f6"], 0x1a) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) io_setup(0xc0c8, &(0x7f0000000040)) fallocate(r2, 0x20, 0x0, 0x8000) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0x7, 0x0, 0x7fffffff, 0xff, 0x9}) 15:39:17 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x0, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:17 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{r1}], 0x1, 0x0) 15:39:18 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:18 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) 15:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 15:39:18 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:18 executing program 4: write$selinux_create(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000700)=ANY=[@ANYBLOB="010003000180c200000f495567160a017172d90f6b119a0d13b5b7e2d10180c20000"]) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00\x00\x00\x00_\xa4\x00\x00\x01', {0x2, 0x0, @remote}}) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040001}, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) unlink(&(0x7f0000000640)='./file0\x00') pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000440)="4940df1aa5186e5234a247445158441da7941bb4e4bf7b3b3b2fd71e8770593887133001a952fafe31d7bfdaa792fdbb3e7e3ef55549f6de2c6cc12d80", 0x3d, 0x200080d1, &(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="6f000000750200640000009e2d66eb794775b65d25e15be8c4f6"], 0x1a) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) io_setup(0xc0c8, &(0x7f0000000040)) fallocate(r2, 0x20, 0x0, 0x8000) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0x7, 0x0, 0x7fffffff, 0xff, 0x9}) 15:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 15:39:18 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:18 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:18 executing program 4: write$selinux_create(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000700)=ANY=[@ANYBLOB="010003000180c200000f495567160a017172d90f6b119a0d13b5b7e2d10180c20000"]) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00\x00\x00\x00_\xa4\x00\x00\x01', {0x2, 0x0, @remote}}) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040001}, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) unlink(&(0x7f0000000640)='./file0\x00') pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000440)="4940df1aa5186e5234a247445158441da7941bb4e4bf7b3b3b2fd71e8770593887133001a952fafe31d7bfdaa792fdbb3e7e3ef55549f6de2c6cc12d80", 0x3d, 0x200080d1, &(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="6f000000750200640000009e2d66eb794775b65d25e15be8c4f6"], 0x1a) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) io_setup(0xc0c8, &(0x7f0000000040)) fallocate(r2, 0x20, 0x0, 0x8000) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0x7, 0x0, 0x7fffffff, 0xff, 0x9}) 15:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:18 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) dup3(r1, r0, 0x0) 15:39:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:19 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:19 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:19 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 351.886344] IPVS: ftp: loaded support on port[0] = 21 [ 352.054789] chnl_net:caif_netlink_parms(): no params data found [ 352.070085] device bridge_slave_1 left promiscuous mode [ 352.076037] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.118957] device bridge_slave_0 left promiscuous mode [ 352.124441] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.328607] device hsr_slave_1 left promiscuous mode [ 355.389975] device hsr_slave_0 left promiscuous mode [ 355.461123] team0 (unregistering): Port device team_slave_1 removed [ 355.473909] team0 (unregistering): Port device team_slave_0 removed [ 355.485244] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 355.531100] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 355.608649] bond0 (unregistering): Released all slaves [ 355.703347] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.709854] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.716766] device bridge_slave_0 entered promiscuous mode [ 355.724112] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.731379] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.738666] device bridge_slave_1 entered promiscuous mode [ 355.757546] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 355.766305] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 355.784549] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 355.791879] team0: Port device team_slave_0 added [ 355.797556] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 355.804823] team0: Port device team_slave_1 added [ 355.810318] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 355.818129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 355.869090] device hsr_slave_0 entered promiscuous mode [ 355.907187] device hsr_slave_1 entered promiscuous mode [ 355.967497] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 355.974432] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 355.990207] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.996565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.003228] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.009712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.044648] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 356.051649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 356.060591] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 356.071543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.078941] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.085587] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.092622] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 356.103422] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 356.109717] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.166344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.174875] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.181286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.215143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.239040] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.245424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.259148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.271147] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 356.287956] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 356.295091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.303437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.312679] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 356.320346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 356.337807] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 356.351685] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 356.803714] EXT4-fs (sda1): re-mounted. Opts: 15:39:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f00000000c0)="030400000200600000000000fff53e4202938207d9fb3780398d537500e50600591f301ee616d5c0184374a7ffe4ec55e0650053c0e385472da70100935ba514d4000049a47effd75a61fd5585019dbf00a900000000d1843e770afd6e9ef5837dbd00"/108, 0x6c, 0x0, 0x0, 0x0) 15:39:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:25 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:25 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(0x0, 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:26 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:26 executing program 4: 15:39:26 executing program 0: 15:39:26 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(0x0, 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:26 executing program 3: pipe2$9p(0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:26 executing program 4: 15:39:26 executing program 0: 15:39:26 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(0x0, 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:26 executing program 0: 15:39:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:26 executing program 0: 15:39:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000) 15:39:26 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:26 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:26 executing program 0: [ 359.253784] IPVS: ftp: loaded support on port[0] = 21 [ 359.329149] chnl_net:caif_netlink_parms(): no params data found [ 359.363485] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.370020] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.377198] device bridge_slave_0 entered promiscuous mode [ 359.384604] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.391333] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.398414] device bridge_slave_1 entered promiscuous mode [ 359.416800] device bridge_slave_1 left promiscuous mode [ 359.424166] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.477892] device bridge_slave_0 left promiscuous mode [ 359.483397] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.630330] device hsr_slave_1 left promiscuous mode [ 359.674094] device hsr_slave_0 left promiscuous mode [ 359.713436] team0 (unregistering): Port device team_slave_1 removed [ 359.724948] team0 (unregistering): Port device team_slave_0 removed [ 359.735380] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 359.773866] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 359.848592] bond0 (unregistering): Released all slaves [ 359.911365] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 359.922008] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 359.938844] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 359.946296] team0: Port device team_slave_0 added [ 359.952768] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 359.960409] team0: Port device team_slave_1 added [ 359.965841] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 359.973322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 360.029621] device hsr_slave_0 entered promiscuous mode [ 360.067696] device hsr_slave_1 entered promiscuous mode [ 360.114046] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 360.121184] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 360.136333] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.142791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.149522] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.155963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.235695] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 360.242151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.251335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 360.262041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.270359] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.282916] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.290492] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 360.306274] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 360.312808] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.323123] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 360.330576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.339117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.346790] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.353209] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.363237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 360.371663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.380534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.388613] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.394981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.405186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 360.412628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.423902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 360.431212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 360.442533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 360.455678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 360.465480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 360.483063] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 360.490579] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 360.498516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 360.506474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 360.517224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 360.524451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 360.533057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.543374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 360.551139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 360.559542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 360.569195] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 360.575246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 360.598715] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 360.618432] 8021q: adding VLAN 0 to HW filter on device batadv0 15:39:29 executing program 4: 15:39:29 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000) 15:39:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:29 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:29 executing program 0: 15:39:29 executing program 0: 15:39:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000) 15:39:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:30 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:30 executing program 4: 15:39:30 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:30 executing program 0: 15:39:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:30 executing program 4: 15:39:30 executing program 0: 15:39:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:30 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:30 executing program 0: 15:39:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:30 executing program 4: 15:39:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:30 executing program 0: 15:39:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:30 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:30 executing program 4: 15:39:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext2\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@sb={'sb'}}]}) 15:39:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:31 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:31 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8000) 15:39:31 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='t'], 0xfd85) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:31 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:31 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:31 executing program 4: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x16) 15:39:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8000) 15:39:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 362.723272] ptrace attach of "/root/syz-executor.4"[17784] was attempted by "/root/syz-executor.4"[17785] 15:39:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:31 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8000) 15:39:31 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:32 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:32 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$unix(0xffffffffffffffff, &(0x7f00000000c0)="ba", 0x1, 0x80, &(0x7f0000000200)=@abs, 0x6e) 15:39:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:32 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:32 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2, r0, 0x0, r1}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000680)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x7, 0x20}) close(0xffffffffffffffff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, 0xfffffffffffffffe) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000300)={0x6000, 0x8000}) r6 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000740)="23c21a35e498e8d4fdb6f434f616ed90ded66a51b5c2af61dfa192cf05ae549d1ad654b97899cacb8b6a92b50d35f0363d99e918b9652c5fd88ea560768ac3de2a429efc55fc840168a0bc6906fba1ccc73ca488f889c26f4f8de93dac34d66c63f428c4a45e4c0175be4bee72c37f6576f031ca6e441202307779e2f731", 0x7e, 0x0) keyctl$assume_authority(0x10, r6) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002002, 0x0) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @rand_addr, @remote}, &(0x7f0000000180)=0xc) fadvise64(r4, 0x0, 0x7, 0x2) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:32 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000), 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:32 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) getpgrp(r0) 15:39:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000), 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:32 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:32 executing program 5: 15:39:32 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:33 executing program 5: 15:39:33 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000), 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:33 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:33 executing program 5: 15:39:33 executing program 4: 15:39:33 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:33 executing program 5: 15:39:33 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:33 executing program 4: 15:39:33 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:33 executing program 5: 15:39:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:33 executing program 5: 15:39:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:33 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:33 executing program 4: 15:39:33 executing program 5: 15:39:33 executing program 4: 15:39:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:33 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:33 executing program 5: 15:39:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:33 executing program 4: 15:39:33 executing program 5: 15:39:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:34 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:34 executing program 4: 15:39:34 executing program 5: 15:39:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:34 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:34 executing program 4: 15:39:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:34 executing program 5: 15:39:34 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:34 executing program 4: 15:39:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x0, 0x0}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:34 executing program 5: 15:39:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x0, 0x0}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:34 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:34 executing program 4: 15:39:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:34 executing program 5: 15:39:34 executing program 5: 15:39:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:34 executing program 4: 15:39:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x0, 0x0}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:34 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r0, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(0xffffffffffffffff, 0x3, 0x80000d, 0x8020001) 15:39:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:34 executing program 5: 15:39:34 executing program 4: 15:39:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x0, &(0x7f00000001c0)}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:34 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r0, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(0xffffffffffffffff, 0x3, 0x80000d, 0x8020001) 15:39:35 executing program 5: 15:39:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:35 executing program 4: 15:39:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x0, &(0x7f00000001c0)}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:35 executing program 5: 15:39:35 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r0, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(0xffffffffffffffff, 0x3, 0x80000d, 0x8020001) 15:39:35 executing program 4: 15:39:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x0, &(0x7f00000001c0)}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:35 executing program 5: 15:39:35 executing program 0: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:35 executing program 5: 15:39:35 executing program 4: 15:39:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:35 executing program 0: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:35 executing program 5: 15:39:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 15:39:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:35 executing program 5: 15:39:35 executing program 4: 15:39:35 executing program 0: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 15:39:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x359) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)="035db86376868768fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7", 0x2a}], 0x1}, 0x0) 15:39:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x4}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:35 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 15:39:35 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) [ 366.860901] Dead loop on virtual device ip6_vti0, fix it urgently! 15:39:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:36 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 15:39:36 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x2f72cbb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:39:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 15:39:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:36 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp\x00\x00\x00?\xefI\x03\xa0\xb5V\xcfF\xbd\xe2\xcc\xca\x944\x17m,\x00\x04\x00\x00\x00\x00\x00\x00\x90!{\x95\x10\v.\xa7\xb0v\xba\xdfv\x06\x05\xef\x87\x83G\v\xe4F\xd5\x02\x00\x00\x00\x00\x00\x00\x00G\xf7j\xe4L>\n.8\x0e\x068(9\xddu\xcd^\x05\xf7C=yR%\x88\xd9\x06\xac\x03-vgV%\x00\x00\x00\x00\x00\x00') socketpair$unix(0x1, 0x8000000000000005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 15:39:36 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 15:39:36 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 15:39:36 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:39:36 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:39:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) connect$inet6(r0, 0x0, 0x0) 15:39:36 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f0200000000ee420f000000000000580f02000000003f420f0000000000856b76b5ee7fffffff000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:36 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:36 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) connect$inet6(r0, 0x0, 0x0) 15:39:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:39:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f000044b000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:39:36 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) connect$inet6(r0, 0x0, 0x0) 15:39:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:39:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000600)="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", 0x113) 15:39:37 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 15:39:37 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:37 executing program 3: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x359) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)="035db86376868768fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7", 0x28}], 0x1}, 0x900) 15:39:37 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'.o\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x22, &(0x7f0000000040)=r1, 0x52d) 15:39:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 15:39:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:37 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:37 executing program 3: bind$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) 15:39:37 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 15:39:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:37 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x2b, &(0x7f0000000040), 0x52d) 15:39:37 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:37 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 15:39:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000100)=""/30}, 0x18) 15:39:37 executing program 3: getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000140)="c68ed278b7", 0x0}, 0x18) 15:39:37 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 15:39:38 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:38 executing program 3: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="130000001000ffdde200f49ff60f050000230a009d0000000f0ac53022e5f9ec364f0000c0ff030000001c24e175cc46341b17e87350871b857af4dc5fb1f037101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db35411543e1226218e88cfc13748efbb693d8a0c8efc28ceb4ec3ff429592e67e7e4f28bca763acd06f40ad03226af55e7129849ae2d726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b268", 0x13) 15:39:38 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 15:39:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) [ 369.201297] audit: type=1400 audit(1564414778.193:114): avc: denied { create } for pid=18291 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 15:39:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) [ 369.263043] audit: type=1400 audit(1564414778.223:115): avc: denied { write } for pid=18291 comm="syz-executor.3" path="socket:[65289]" dev="sockfs" ino=65289 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 15:39:38 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:38 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:38 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:38 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:38 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 15:39:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:38 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:38 executing program 5: ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:38 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:38 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000) 15:39:38 executing program 5: ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:39 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:39 executing program 5: ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:39 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, 0x0, 0x0) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000) 15:39:39 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:39 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000) 15:39:39 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, 0x0, 0x0) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:39 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8000) 15:39:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:39 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, 0x0, 0x0) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:39 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8000) 15:39:39 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0x0) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:39 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, 0x0) 15:39:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 15:39:39 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0x0) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:39 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, 0x0) 15:39:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8000) 15:39:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 15:39:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000) 15:39:40 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0x0) fallocate(r0, 0x3, 0x80000d, 0x8020001) 15:39:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:40 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, 0x0) 15:39:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 15:39:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000) 15:39:40 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(0xffffffffffffffff, 0x3, 0x80000d, 0x8020001) 15:39:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 15:39:40 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x0, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:40 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000) 15:39:40 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x0, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 15:39:40 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(0xffffffffffffffff, 0x3, 0x80000d, 0x8020001) 15:39:40 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x2, 0x0) 15:39:40 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x0, 0x0, 0xb, 0x5, 0x0, 0x81}) 15:39:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x0) 15:39:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 15:39:40 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:40 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(0xffffffffffffffff, 0x3, 0x80000d, 0x8020001) 15:39:40 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0x0, 0x5, 0x0, 0x81}) 15:39:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 15:39:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 15:39:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x0) 15:39:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:40 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0x0, 0x5, 0x0, 0x81}) 15:39:41 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x0, 0x80000d, 0x8020001) 15:39:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 15:39:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 15:39:41 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0x0, 0x5, 0x0, 0x81}) 15:39:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x0) 15:39:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 15:39:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 15:39:41 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x0, 0x80000d, 0x8020001) 15:39:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:41 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x0, 0x0, 0x81}) 15:39:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}], 0x1, 0x0) 15:39:41 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x0, 0x80000d, 0x8020001) 15:39:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:41 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x0, 0x0, 0x81}) 15:39:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:41 executing program 1: setresuid(0x0, 0xfffe, 0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000200)="82", 0x1, 0xfffffffffffffffb) r1 = socket$kcm(0xa, 0x2, 0x11) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, 0x0, r2) 15:39:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}], 0x1, 0x0) 15:39:41 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x0, 0x8020001) 15:39:41 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:41 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x0, 0x0, 0x81}) 15:39:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x2c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) 15:39:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}], 0x1, 0x0) 15:39:41 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x0, 0x8020001) 15:39:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:41 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5}) 15:39:41 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x24, 0x24, 0x1}, 0x24}}, 0x0) 15:39:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 15:39:41 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5}) 15:39:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:41 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x24, 0x24, 0x1}, 0x24}}, 0x0) 15:39:41 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x0, 0x8020001) 15:39:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newtfilter={0x24, 0x24, 0x1}, 0x24}}, 0x0) 15:39:42 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x18, 0x0, 0xb, 0x5}) 15:39:42 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:42 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x0) 15:39:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 15:39:42 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x122000000003, 0x11) fstatfs(r1, &(0x7f00000000c0)=""/180) 15:39:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:42 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2010000000000022, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto(r0, &(0x7f0000000040)="16", 0x1, 0x40, 0x0, 0x0) 15:39:42 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x0) 15:39:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 15:39:42 executing program 3: syz_emit_ethernet(0x66, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f00"/115], 0x0) 15:39:42 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:42 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:42 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x808000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x3, 0x80000d, 0x0) 15:39:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}], 0x60}}], 0x2, 0x0) 15:39:42 executing program 3: syz_emit_ethernet(0x66, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f00"/115], 0x0) 15:39:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:42 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:42 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:42 executing program 0: clock_gettime(0x800ff, 0x0) 15:39:42 executing program 3: syz_emit_ethernet(0x66, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f00"/115], 0x0) 15:39:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3}, @ssrr={0x89, 0x3}]}}}], 0x48}}], 0x2, 0x0) 15:39:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:42 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@part={'part'}}]}) 15:39:42 executing program 1: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:42 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:43 executing program 3: syz_emit_ethernet(0x66, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f00"/115], 0x0) 15:39:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}, @ip_ttl={{0x14}}], 0x30}}], 0x2, 0x0) 15:39:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:43 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@part={'part', 0x3d, 0x100000000}}]}) 15:39:43 executing program 1: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:43 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:43 executing program 1: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}], 0x18}}], 0x2, 0x0) 15:39:43 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 15:39:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:43 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:43 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 15:39:43 executing program 5: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)}}], 0x2, 0x0) 15:39:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:43 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:43 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 15:39:43 executing program 5: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)}}], 0x2, 0x0) 15:39:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:43 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:43 executing program 3: syz_emit_ethernet(0x0, &(0x7f00000003c0)=ANY=[], 0x0) 15:39:43 executing program 5: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)}}], 0x2, 0x0) 15:39:43 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:43 executing program 3: syz_emit_ethernet(0x0, &(0x7f00000003c0)=ANY=[], 0x0) 15:39:43 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:44 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x10}}], 0x10}}], 0x2, 0x0) 15:39:44 executing program 3: syz_emit_ethernet(0x0, &(0x7f00000003c0)=ANY=[], 0x0) 15:39:44 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:44 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) 15:39:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:44 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x10}}], 0x10}}], 0x2, 0x0) 15:39:44 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:44 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) 15:39:44 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x10}}], 0x10}}], 0x2, 0x0) 15:39:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:44 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) 15:39:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x432, 0xffffffffffffffff, 0x0) 15:39:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:44 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}], 0x18}}], 0x1, 0x0) 15:39:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:44 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000"], 0x0) 15:39:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}], 0x18}}], 0x1, 0x0) 15:39:44 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 15:39:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:44 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000"], 0x0) 15:39:44 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, 0x0, 0x0) 15:39:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 15:39:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='pipefs\x00', 0x0, 0x0) 15:39:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}], 0x18}}], 0x1, 0x0) 15:39:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:44 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000"], 0x0) 15:39:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 15:39:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 15:39:45 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, 0x0, 0x0) 15:39:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}], 0x18}}], 0x2, 0x0) 15:39:45 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:45 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000"], 0x0) 15:39:45 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 15:39:45 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, 0x0, 0x0) 15:39:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000001340)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) prctl$PR_SET_SECUREBITS(0x1c, 0x5) setresuid(0x0, 0xee01, 0x0) keyctl$setperm(0x5, r0, 0x102006) keyctl$setperm(0x5, r0, 0x0) 15:39:45 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x6) 15:39:45 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000"], 0x0) 15:39:45 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x20) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) 15:39:45 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, 0x0}, 0x0) 15:39:45 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 15:39:45 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x6) 15:39:45 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000"], 0x0) 15:39:45 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, 0x0}, 0x0) 15:39:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:45 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x20) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) 15:39:45 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c0"], 0x0) 15:39:45 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) 15:39:45 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, 0x0}, 0x0) 15:39:45 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x6) 15:39:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:45 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c0"], 0x0) 15:39:45 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x20) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) 15:39:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:45 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:39:45 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c0"], 0x0) 15:39:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x6) 15:39:46 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f0000000000"], 0x0) 15:39:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0800b5055e0bcfe87b0071") r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ftruncate(r2, 0x0) 15:39:46 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:39:46 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x20) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) 15:39:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:46 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f0000000000"], 0x0) 15:39:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x6) 15:39:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:46 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:39:46 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f0000000000"], 0x0) 15:39:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) sendfile(r0, r1, 0x0, 0x6) 15:39:46 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) 15:39:47 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0800b5055e0bcfe87b0071") r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ftruncate(r2, 0x0) 15:39:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:47 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f000000000000000000"], 0x0) 15:39:47 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) 15:39:47 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) sendfile(r0, r1, 0x0, 0x6) 15:39:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:47 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f000000000000000000"], 0x0) 15:39:47 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:47 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f000000000000000000"], 0x0) 15:39:47 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) 15:39:47 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) sendfile(r0, r1, 0x0, 0x6) 15:39:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0800b5055e0bcfe87b0071") r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ftruncate(r2, 0x0) 15:39:47 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 15:39:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:47 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f00"/114], 0x0) 15:39:47 executing program 2: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x20) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 15:39:47 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000001}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) 15:39:47 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x6) 15:39:47 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f00"/114], 0x0) 15:39:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)=']', 0x1) 15:39:47 executing program 2: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x20) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) [ 378.683001] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 378.735221] kasan: CONFIG_KASAN_INLINE enabled [ 378.761084] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 378.784702] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 378.790981] CPU: 1 PID: 19077 Comm: syz-executor.1 Not tainted 4.19.62 #36 [ 378.797987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:39:47 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005800000000002f9078ac1414aaac1414aa3481880b000000000000080000000057080088be00000000100000000100000000000000080022eb00000000200000080065580000000000298f6a17b3732ce51fa9c02d4f00"/114], 0x0) 15:39:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0800b5055e0bcfe87b0071") r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ftruncate(r2, 0x0) [ 378.807370] RIP: 0010:tcf_ife_init+0x221/0x17d0 [ 378.812051] Code: fb 48 c7 c2 09 92 83 85 be 01 00 00 00 48 c7 c7 a0 f0 79 88 e8 20 f9 ce fb 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 48 89 d8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 83 [ 378.831068] RSP: 0018:ffff88809e146ee0 EFLAGS: 00010246 [ 378.836445] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff11012f1b17e [ 378.843815] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000282 [ 378.851149] RBP: ffff88809e147068 R08: ffff8880978d8380 R09: 0000000000000001 [ 378.858454] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000001 [ 378.865724] R13: ffff8880a52fb200 R14: ffff88809e147040 R15: 0000000000000001 [ 378.873004] FS: 00007efc9581c700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 378.881219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 378.887113] CR2: 00007f849533d110 CR3: 000000008b381000 CR4: 00000000001406e0 [ 378.894370] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 378.901657] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 378.908911] Call Trace: [ 378.911521] ? __add_metainfo+0x480/0x480 [ 378.915657] ? lock_downgrade+0x810/0x810 [ 378.919799] ? kasan_check_write+0x14/0x20 [ 378.924036] ? do_raw_read_unlock+0x3f/0x70 [ 378.928343] tcf_action_init_1+0x804/0xc40 [ 378.932562] ? tcf_action_dump_old+0x80/0x80 [ 378.936966] ? __lock_acquire+0x6ee/0x49c0 [ 378.941184] ? __lock_acquire+0x6ee/0x49c0 [ 378.945431] ? memset+0x32/0x40 [ 378.948735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.954265] tcf_action_init+0x23e/0x360 [ 378.958313] ? tcf_action_init_1+0xc40/0xc40 [ 378.962713] ? avc_has_extended_perms+0x10f0/0x10f0 [ 378.967715] tcf_action_add+0xe8/0x370 [ 378.971599] ? tca_action_gd+0x1690/0x1690 [ 378.975839] ? memset+0x32/0x40 [ 378.979102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.984621] ? nla_parse+0x1fc/0x2f0 [ 378.988322] tc_ctl_action+0x37a/0x46f [ 378.992194] ? tcf_action_add+0x370/0x370 [ 378.996325] ? __lock_is_held+0xb6/0x140 [ 379.000372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.005889] ? tcf_action_add+0x370/0x370 [ 379.010022] rtnetlink_rcv_msg+0x463/0xb00 [ 379.014242] ? rtnetlink_put_metrics+0x560/0x560 [ 379.018983] ? netdev_pick_tx+0x300/0x300 [ 379.023115] ? netlink_deliver_tap+0x22d/0xc20 [ 379.027686] ? find_held_lock+0x35/0x130 [ 379.031737] netlink_rcv_skb+0x17d/0x460 [ 379.035799] ? rtnetlink_put_metrics+0x560/0x560 [ 379.040554] ? netlink_ack+0xb30/0xb30 [ 379.044425] ? kasan_check_read+0x11/0x20 [ 379.048555] ? netlink_deliver_tap+0x254/0xc20 [ 379.053119] rtnetlink_rcv+0x1d/0x30 [ 379.056838] netlink_unicast+0x537/0x720 [ 379.060903] ? netlink_attachskb+0x770/0x770 [ 379.065309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.070833] netlink_sendmsg+0x8ae/0xd70 [ 379.074880] ? netlink_unicast+0x720/0x720 [ 379.079101] ? selinux_socket_sendmsg+0x36/0x40 [ 379.083761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.089291] ? security_socket_sendmsg+0x8d/0xc0 [ 379.094049] ? netlink_unicast+0x720/0x720 [ 379.098281] sock_sendmsg+0xd7/0x130 [ 379.102002] ___sys_sendmsg+0x803/0x920 [ 379.105965] ? copy_msghdr_from_user+0x430/0x430 [ 379.110753] ? lock_downgrade+0x810/0x810 [ 379.114887] ? kasan_check_read+0x11/0x20 [ 379.119041] ? __fget+0x367/0x540 [ 379.122485] ? iterate_fd+0x360/0x360 [ 379.126268] ? lock_downgrade+0x810/0x810 [ 379.130400] ? __fget_light+0x1a9/0x230 [ 379.134366] ? __fdget+0x1b/0x20 [ 379.137753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 379.143278] __sys_sendmsg+0x105/0x1d0 [ 379.147163] ? __ia32_sys_shutdown+0x80/0x80 [ 379.151581] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 379.156339] ? do_syscall_64+0x26/0x620 [ 379.160302] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.165646] ? do_syscall_64+0x26/0x620 [ 379.169607] __x64_sys_sendmsg+0x78/0xb0 [ 379.173652] do_syscall_64+0xfd/0x620 [ 379.177454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.182651] RIP: 0033:0x459829 [ 379.185829] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.204713] RSP: 002b:00007efc9581bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:39:48 executing program 2: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x20) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 15:39:48 executing program 3: [ 379.212423] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 379.219676] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 379.226934] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 379.234193] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efc9581c6d4 [ 379.241450] R13: 00000000004c773c R14: 00000000004dce48 R15: 00000000ffffffff [ 379.248707] Modules linked in: [ 379.256594] ---[ end trace de1a795bcd49e5b7 ]--- 15:39:48 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x6) [ 379.263075] RIP: 0010:tcf_ife_init+0x221/0x17d0 [ 379.270497] Code: fb 48 c7 c2 09 92 83 85 be 01 00 00 00 48 c7 c7 a0 f0 79 88 e8 20 f9 ce fb 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 48 89 d8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 83 [ 379.292544] RSP: 0018:ffff88809e146ee0 EFLAGS: 00010246 [ 379.299671] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff11012f1b17e 15:39:48 executing program 3: [ 379.312528] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000282 [ 379.316547] kobject: 'loop2' (000000001db629f5): kobject_uevent_env [ 379.322973] RBP: ffff88809e147068 R08: ffff8880978d8380 R09: 0000000000000001 [ 379.329907] kobject: 'loop2' (000000001db629f5): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 379.335091] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000001 [ 379.355703] kobject: 'loop5' (00000000c6a2ba38): kobject_uevent_env 15:39:48 executing program 2: r0 = creat(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x20) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) [ 379.372357] kobject: 'loop5' (00000000c6a2ba38): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 379.381288] R13: ffff8880a52fb200 R14: ffff88809e147040 R15: 0000000000000001 [ 379.397284] FS: 00007efc9581c700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 379.406408] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 379.412671] CR2: 0000000020000080 CR3: 000000008b381000 CR4: 00000000001406e0 [ 379.420437] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 379.423513] kobject: 'loop4' (00000000a38061de): kobject_uevent_env [ 379.434508] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 379.440642] kobject: 'loop4' (00000000a38061de): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 379.444566] Kernel panic - not syncing: Fatal exception [ 379.457894] Kernel Offset: disabled [ 379.461612] Rebooting in 86400 seconds..